Article of the Month
Downloads: 178 | Views: 279
Mechanical Engineering, India, Volume 2 Issue 6, June 2013
Pages: 230 - 235Performance Analysis of Reciprocating Refrigerant Compressor
SharadChaudhary, Deepak Gupta
Volume 2 Issue 6, June 2013: Page -1
Downloads: 122 | Views: 158
Computer Science & Engineering, India, Volume 2 Issue 6, June 2013
Pages: 287 - 290Public Key Encryption : A Survey
Banazir B
Downloads: 120 | Views: 148
Computer Science & Engineering, India, Volume 2 Issue 6, June 2013
Pages: 291 - 294Survey on Common Spatial Pattern Detection using Affine Transformation
Shashikala N | Dr. S.B Shivakumar | Ramesh [238]
Downloads: 110 | Views: 143
Computer Science, India, Volume 2 Issue 6, June 2013
Pages: 295 - 298Interserver Service Allocation Model using Soa
V. Padmavathi | N. Shenbagavadivu
Downloads: 125 | Views: 174
Computer Science & Engineering, India, Volume 2 Issue 6, June 2013
Pages: 299 - 302Comprative Study Of Green Computing On University Campus
Pankaj [124] | Pawan Prakash Singh [3]
Downloads: 139 | Views: 183 | Today Hits: ⮙1 | Monthly Hits: ⮙1
Mechanical Engineering, India, Volume 2 Issue 6, June 2013
Pages: 303 - 305Improving the Performance of Household Refrigerator by Recovering Heat from the Condenser
Y.A.Patil | H.M.Dange
Downloads: 125 | Views: 208
Anthropology Science, Kenya, Volume 2 Issue 6, June 2013
Pages: 306 - 312The Role Of Constituency Development Fund In Rural Development: Experiences From North Mugirango Constituency, Kenya
Samwel Auya [6] | Peter Oino [6]
Downloads: 127 | Views: 189
Anthropology Science, Kenya, Volume 2 Issue 6, June 2013
Pages: 313 - 319The role of Networks of Relations among Street Children in Kenya: Evidence from Eldoret Municipality
Samwel Auya [6] | Peter Oino [6]
Downloads: 115 | Views: 149
Computer Science & Engineering, India, Volume 2 Issue 6, June 2013
Pages: 320 - 323A Trivial And Consistent Routing With In-Network Aggregation In Wireless Sensor Networks
C.Pravallika | T.Venkata Naga Jayudu
Downloads: 125 | Views: 172
Computer Science & Engineering, India, Volume 2 Issue 6, June 2013
Pages: 324 - 328Avoiding selective jam attack by packet hiding method in wireless sensor network
Dilip kumar D.P | H. Venugopal
Downloads: 131 | Views: 186
Computer Science & Engineering, India, Volume 2 Issue 6, June 2013
Pages: 329 - 334Secure and Optimized Algorithm for Implementation of Digital Signature
Isha Jauhari | Jitendra Kumar [23]