Volume 3 Issue 5, May 2014: Page 280
Downloads: 107 | Views: 528
Peace and Conflict Studies, Nigeria, Volume 3 Issue 5, May 2014
Pages: 1450 - 1458Activities of the Boko Haram Sect as Threat to Nigeria Security
Agbegbedia Oghenevwoke Anthony
Downloads: 107 | Views: 360
Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1459 - 1461Using Peer to Peer Approach of Distributed Systems to Design a Chat Room Application
Kennevor D.G. Kharsyntiew
Downloads: 116 | Views: 382
Medicine Science, Ethiopia, Volume 3 Issue 5, May 2014
Pages: 1462 - 1468Survival Analysis of HIV Infected People on Antiretroviral Therapy at Mizan-Aman General Hospital; Southwest Ethiopia
Tezera Moshago, Demissew Berihun Haile, Fikire Enkusilasie
Downloads: 121 | Views: 428
Industrial Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1469 - 1472Improvement in Plant Layout Using Material Handling Technique
Amrita Kirtane, Dr. Nagendra Sohani
Downloads: 104 | Views: 366
Mathematics, India, Volume 3 Issue 5, May 2014
Pages: 1473 - 1480Weight Constrained Travelling Salesman Problem on Halin Graphs
Dharmananda Gahir
Downloads: 134 | Views: 535
Civil Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1481 - 1483Rubberized Concrete Made with Crumb Rubber
Yogender Antil, Er. Vivek Verma, Er. Bhupinder Singh
Downloads: 130 | Views: 528
Management, India, Volume 3 Issue 5, May 2014
Pages: 1484 - 1487A Study to Understand Retailer's Behaviors towards Bank to Open Current Account in Rural India
Satish Rewatkar, Shraddha Wairagade
Downloads: 111 | Views: 462
Information Technology, India, Volume 3 Issue 5, May 2014
Pages: 1488 - 1491Combined Mining Approach and Pattern Discovery in ?Online Shopping Application?
Kamble Jayshree Raghunath
Downloads: 114 | Views: 422
Medicine Science, India, Volume 3 Issue 5, May 2014
Pages: 1492 - 1495Cetrimide Induced Metabolic Acidosis: A Rare Intraoperative Complication in a Case of Hydatid Disease of Liver
Ketul S. Puj, Vineet F. Chauhan
Downloads: 111 | Views: 459
Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1496 - 1500An Intrusion Detection Model for Detecting Type of Attack Using Data Mining
Amruta Surana, Shyam Gupta