Volume 2 Issue 2, February 2013: Page 10
Downloads: 140 | Views: 483
Computer Science & Engineering, India, Volume 2 Issue 2, February 2013
Pages: 82 - 87Traffic Reduction: A Wifi Energy Efficiency Management
Rophina Rodrigo R.L., S.Muthukumarasamy
Downloads: 129 | Views: 489
Computer Science & Engineering, India, Volume 2 Issue 2, February 2013
Pages: 88 - 92Review of Various Data Storage Techniques
Rajeshwar Dass, Namita
Downloads: 157 | Views: 576
Mechanical Engineering, India, Volume 2 Issue 2, February 2013
Pages: 93 - 97A Review on use of Mistake Proofing (Poka Yoke) Tool in Blow Molding Process
Patel Parikshit K, Vidya Nair, Patel Nikunj S
Downloads: 134 | Views: 568
Mechanical Engineering, Zimbabwe, Volume 2 Issue 2, February 2013
Pages: 98 - 103The use of Work Study Techniques in Optimizing Manufacturing Plant Maintenance Processes: an Investigation into a Fertilizer Manufacturing Company in Zimbabwe
Mutombozana Tapiwa, Mugwindiri Kumbirayi, Chikuku Tauyanashe
Downloads: 133 | Views: 504
Computer Science & Engineering, India, Volume 2 Issue 2, February 2013
Pages: 104 - 106Performance Analysis of Scheduling Algorithms in Simulated Parallel Environment
Anupreet Kaur, Pawan Kumar
Downloads: 136 | Views: 504
Mechanical Engineering, India, Volume 2 Issue 2, February 2013
Pages: 107 - 110Reducing Shrinkage in Plastic Injection Moulding using Taguchi Method in Tata Magic Head Light
Mohd. Muktar Alam, Deepak Kumar
Downloads: 121 | Views: 527
Mechanical Engineering, China, Volume 2 Issue 2, February 2013
Pages: 111 - 113A Review of Safety Procedures and Guide Lines in Manufacturing Workshop
Abubakar Buhari, Umar Abubakar, Hassan Tukur
Downloads: 127 | Views: 520
Criminology and Forensic Science, India, Volume 2 Issue 2, February 2013
Pages: 114 - 117Signature Scrutiny System in Banking Application
Bhavana Desai, J. L. Kalyan
Downloads: 107 | Views: 468
Criminology and Forensic Science, India, Volume 2 Issue 2, February 2013
Pages: 118 - 122Proposed Approach for Iris Recognition in Security Based Applications
Sri Sachidanand S. Joshi, Bhavana Desai, J. L. Kalyan
Downloads: 124 | Views: 497
Criminology and Forensic Science, India, Volume 2 Issue 2, February 2013
Pages: 123 - 126An Approach to Authentication of Fingerprints in ATM
Sri Sachidananda S. Joshi, Bhavana. Desai, J. L. Kalyan