Volume 2 Issue 2, February 2013: Page 10
Downloads: 140 | Views: 509
Computer Science & Engineering, India, Volume 2 Issue 2, February 2013
Pages: 82 - 87Traffic Reduction: A Wifi Energy Efficiency Management
Rophina Rodrigo R.L., S.Muthukumarasamy
Downloads: 129 | Views: 514
Computer Science & Engineering, India, Volume 2 Issue 2, February 2013
Pages: 88 - 92Review of Various Data Storage Techniques
Rajeshwar Dass, Namita
Downloads: 157 | Views: 603
Mechanical Engineering, India, Volume 2 Issue 2, February 2013
Pages: 93 - 97A Review on use of Mistake Proofing (Poka Yoke) Tool in Blow Molding Process
Patel Parikshit K, Vidya Nair, Patel Nikunj S
Downloads: 134 | Views: 635
Mechanical Engineering, Zimbabwe, Volume 2 Issue 2, February 2013
Pages: 98 - 103The use of Work Study Techniques in Optimizing Manufacturing Plant Maintenance Processes: an Investigation into a Fertilizer Manufacturing Company in Zimbabwe
Mutombozana Tapiwa, Mugwindiri Kumbirayi, Chikuku Tauyanashe
Downloads: 133 | Views: 534
Computer Science & Engineering, India, Volume 2 Issue 2, February 2013
Pages: 104 - 106Performance Analysis of Scheduling Algorithms in Simulated Parallel Environment
Anupreet Kaur, Pawan Kumar
Downloads: 136 | Views: 538
Mechanical Engineering, India, Volume 2 Issue 2, February 2013
Pages: 107 - 110Reducing Shrinkage in Plastic Injection Moulding using Taguchi Method in Tata Magic Head Light
Mohd. Muktar Alam, Deepak Kumar
Downloads: 121 | Views: 560
Mechanical Engineering, China, Volume 2 Issue 2, February 2013
Pages: 111 - 113A Review of Safety Procedures and Guide Lines in Manufacturing Workshop
Abubakar Buhari, Umar Abubakar, Hassan Tukur
Downloads: 127 | Views: 549
Criminology and Forensic Science, India, Volume 2 Issue 2, February 2013
Pages: 114 - 117Signature Scrutiny System in Banking Application
Bhavana Desai, J. L. Kalyan
Downloads: 108 | Views: 499
Criminology and Forensic Science, India, Volume 2 Issue 2, February 2013
Pages: 118 - 122Proposed Approach for Iris Recognition in Security Based Applications
Sri Sachidanand S. Joshi, Bhavana Desai, J. L. Kalyan
Downloads: 124 | Views: 525
Criminology and Forensic Science, India, Volume 2 Issue 2, February 2013
Pages: 123 - 126An Approach to Authentication of Fingerprints in ATM
Sri Sachidananda S. Joshi, Bhavana. Desai, J. L. Kalyan