Volume 3 Issue 5, May 2014: Page 29
Research Paper, Peace and Conflict Studies, Nigeria
Pages: 1450 - 1458, Hits: 106Activities of the Boko Haram Sect as Threat to Nigeria Security
Agbegbedia Oghenevwoke Anthony
Research Paper, Computer Science & Engineering, India
Pages: 1459 - 1461, Hits: 106Using Peer to Peer Approach of Distributed Systems to Design a Chat Room Application
Kennevor D.G. Kharsyntiew
Research Paper, Medicine Science, Ethiopia
Pages: 1462 - 1468, Hits: 116Survival Analysis of HIV Infected People on Antiretroviral Therapy at Mizan-Aman General Hospital; Southwest Ethiopia
Tezera Moshago, Demissew Berihun Haile, Fikire Enkusilasie
Research Paper, Industrial Engineering, India
Pages: 1469 - 1472, Hits: 120Improvement in Plant Layout Using Material Handling Technique
Amrita Kirtane, Dr. Nagendra Sohani
Research Paper, Mathematics, India
Pages: 1473 - 1480, Hits: 104Weight Constrained Travelling Salesman Problem on Halin Graphs
Dharmananda Gahir
Research Paper, Civil Engineering, India
Pages: 1481 - 1483, Hits: 131Rubberized Concrete Made with Crumb Rubber
Yogender Antil, Er. Vivek Verma, Er. Bhupinder Singh
Research Paper, Management, India
Pages: 1484 - 1487, Hits: 130A Study to Understand Retailer's Behaviors towards Bank to Open Current Account in Rural India
Satish Rewatkar, Shraddha Wairagade
Research Paper, Information Technology, India
Pages: 1488 - 1491, Hits: 110Combined Mining Approach and Pattern Discovery in ?Online Shopping Application?
Kamble Jayshree Raghunath
Case Studies, Medicine Science, India
Pages: 1492 - 1495, Hits: 114Cetrimide Induced Metabolic Acidosis: A Rare Intraoperative Complication in a Case of Hydatid Disease of Liver
Ketul S. Puj, Vineet F. Chauhan
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India
Pages: 1496 - 1500, Hits: 110An Intrusion Detection Model for Detecting Type of Attack Using Data Mining
Amruta Surana, Shyam Gupta