Article of the Month
Downloads: 153 | Views: 323
Mechanical Engineering, India, Volume 2 Issue 5, May 2013
Pages: 186 - 189Identification Of Improvement Opportunity In Drum Mix Plant Manufacturing Using Iso 9001 - Qms Standard
Jainish Doshi, Kedar Bhojak, Jigar Doshi
Volume 2 Issue 5, May 2013: Page 1
Downloads: 104 | Views: 199 | Rating: 6.9 / 10
Civil Engineering, India, Volume 2 Issue 5, May 2013
Pages: 30 - 36Affordable Housing Materials & Techniques for Urban Poors
S.S.Shinde | A.B.Karankal
Downloads: 121 | Views: 221 | Rating: 6.4 / 10
Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 37 - 40Bio-Inspired Methods for Efficient MANET
Pankaj Chaudhary [2] | Sachin Chaudhary
Downloads: 118 | Views: 242 | Rating: 6.7 / 10
Information Technology, India, Volume 2 Issue 5, May 2013
Pages: 41 - 43Non Invasive Blood Glucose Measurement through Microwave Resonator
Shiv Kumar [16] | Jaspal Singh [6]
Downloads: 121 | Views: 230 | Rating: 6.2 / 10
Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 44 - 47Effective Tunneling Of Data And Traffic Management Over Network Using L2TP Based ON L2F
Preeti [131] | Ajay Rana
Downloads: 109 | Views: 214 | Rating: 6.2 / 10
Information Technology, India, Volume 2 Issue 5, May 2013
Pages: 53 - 57Design and interfacing of the optical assembly For Automated Analyzer
Swati Kapoor | Vikas Goel [2]
Downloads: 111 | Views: 232 | Rating: 6.6 / 10
Electronics & Communication Engineering, India, Volume 2 Issue 5, May 2013
Pages: 58 - 62Human Identification by Ear Images Using SIFT Algorithm
Himanshu Maurya | Shikha Maurya
Downloads: 120 | Views: 221 | Rating: 6.7 / 10
Biochemistry Science, India, Volume 2 Issue 5, May 2013
Pages: 63 - 66Lipid patterns in Sub clinical hypothyroidism of non-obese group in Rural tertiary care centre
Krishna Murthy V | Venkata Madhav M | Anjaneya Prasad V [2] | Pradeep Babu [2]
Downloads: 116 | Views: 211 | Rating: 6.3 / 10
Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 67 - 69Query Explication by Semantic Approach
Downloads: 115 | Views: 174 | Rating: 6.2 / 10
Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 70 - 73Detection and Mitigation Techniques of Black Hole Attack in MANET: An Overview
Swati Jain | Naveen Hemrajani [2]
Downloads: 131 | Views: 228 | Rating: 6.1 / 10
Mathematics, India, Volume 2 Issue 5, May 2013
Pages: 74 - 77Cordial Labeling of Kn;n related graphs
G. V. Ghodasara [3] | A. H. Rokad [2]