Article of the Month
Downloads: 163 | Views: 339 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, Malaysia, Volume 2 Issue 2, February 2013
Pages: 487 - 505Review of Artificial Intelligence
Jameela Ali Akrimi, Abdul Rahim Ahmad, Loay E. George, Sherna Aziz
Volume 2 Issue 2, February 2013: Page 1
Downloads: 139 | Views: 219
Computer Science & Engineering, India, Volume 2 Issue 2, February 2013
Pages: 82 - 87Traffic Reduction: A Wifi Energy Efficiency Management
Rophina Rodrigo R.L. | S.Muthukumarasamy
Downloads: 129 | Views: 215
Computer Science & Engineering, India, Volume 2 Issue 2, February 2013
Pages: 88 - 92Review of Various Data Storage Techniques
Rajeshwar Dass [2] | Namita [24]
Downloads: 156 | Views: 265 | Today Hits: ⮙1 | Monthly Hits: ⮙1
Mechanical Engineering, India, Volume 2 Issue 2, February 2013
Pages: 93 - 97A Review on use of Mistake Proofing (Poka Yoke) Tool in Blow Molding Process
Patel Parikshit K | Vidya Nair | Patel Nikunj S [2]
Downloads: 134 | Views: 236 | Today Hits: ⮙1 | Monthly Hits: ⮙1
Mechanical Engineering, Zimbabwe, Volume 2 Issue 2, February 2013
Pages: 98 - 103The use of Work Study Techniques in Optimizing Manufacturing Plant Maintenance Processes: an Investigation into a Fertilizer Manufacturing Company in Zimbabwe
Mutombozana Tapiwa | Mugwindiri Kumbirayi | Chikuku Tauyanashe [2]
Downloads: 133 | Views: 224
Computer Science & Engineering, India, Volume 2 Issue 2, February 2013
Pages: 104 - 106Performance Analysis of Scheduling Algorithms in Simulated Parallel Environment
Anupreet Kaur [5] | Pawan Kumar [34]
Downloads: 136 | Views: 232 | Monthly Hits: ⮙1
Mechanical Engineering, India, Volume 2 Issue 2, February 2013
Pages: 107 - 110Reducing Shrinkage in Plastic Injection Moulding using Taguchi Method in Tata Magic Head Light
Mohd. Muktar Alam | Deepak Kumar [26]
Downloads: 121 | Views: 214 | Today Hits: ⮙2 | Monthly Hits: ⮙2
Mechanical Engineering, China, Volume 2 Issue 2, February 2013
Pages: 111 - 113A Review of Safety Procedures and Guide Lines in Manufacturing Workshop
Abubakar Buhari | Umar Abubakar [2] | Hassan Tukur [2]
Downloads: 126 | Views: 213
Criminology and Forensic Science, India, Volume 2 Issue 2, February 2013
Pages: 114 - 117Signature Scrutiny System in Banking Application
Bhavana Desai [3] | J. L. Kalyan [3]
Downloads: 107 | Views: 201
Criminology and Forensic Science, India, Volume 2 Issue 2, February 2013
Pages: 118 - 122Proposed Approach for Iris Recognition in Security Based Applications
Sri Sachidanand S. Joshi | Bhavana Desai [3] | J. L. Kalyan [3]
Downloads: 124 | Views: 218
Criminology and Forensic Science, India, Volume 2 Issue 2, February 2013
Pages: 123 - 126An Approach to Authentication of Fingerprints in ATM
Sri Sachidananda S. Joshi | Bhavana. Desai | J. L. Kalyan [3]