Downloads :-
A comparative analysis on life cycle operation & maintenance cost of EHV new genration XLPE insulated cable vs conventional overhead lines
Preet Khandelwal, Arun Pachori, Vol. 2, Issue 5, May, 2013
Restructuring of Existing Distribution System with High voltage Distribution system
Ashutosh Bhadoria, Vol. 2, Issue 5, May, 2013
Linking KM Strategy to R&D Performance: An Empirical Study of CSIR R&D Laboratories
Prof Niraj Kumar, Vol.2, Issue 5, May, 2013
Importance Applications Mobile Agent technology for Virtual E-learning Environment: Proposed Model
Ahmed Dheyaa Basha, Satar Habib Mnaathr, Khalid Abdulrazzaq Abdulnabi Alminshid, Irfan Naufal Umar, (Malaysia), Vol. 2, Issue 5, May, 2013
The opportunities and Difficulties for M-learning to Enhancing students learning results
Satar Habib Mnaathr, Ahmed Dheyaa Basha, Khalid Abdulrazzaq Abdulnabi Alminshid, Rozinah Jamaludin, (Malaysia), Vol. 2, Issue 5, May, 2013
Application of Quantum Breathers in SRR based metamaterials: Femtosecond Response
Bijoy Mandal, Kamal Choudhary, Arindam Biswas, A. K. Bandyopadhyay, A. K. Bhattacharjee, D. Mandal, Vol. 2, Issue 5, May, 2013
Performance Evaluation of Mobile Wimax Networks
Harnek Singh, Harpreet Singh Bedi, Gurpreet Singh, Satinder singh, Vol. 2, Issue 5, May, 2013
Histogram Based Denoising and Equalization of Bio-Medical Images
Kalyan chatterjee, Amit Sur, Prasannjit, Mandavi, Nilotpal Mrinal, Vol. 2, Issue 5, May, 2013
Development of Laboratory Scale Self-Balancing Prototype Robot
M. K. A. Ahamed Khan, I. Elamvazuthi, P. Vasant, T. Ganesan, R. A. Amin, S. Parasuraman, (Malaysia), Vol. 2, Issue 5, May, 2013
Review of State of Art in Electrooculogram Artifact Removal from Electroencephalogram Signals
Meenakshi Sood, Vinay Kumar, Sunil V. Bhooshan, Vol. 2, Issue 5, May, 2013
Maintain Student Record in College Database Using RFID
Ajinkya Nanavati, Amit Hanwate, Sunil Ithape, Vol.2, Issue 5, May, 2013
A review over MANET- Issues and Challenges
Nitin Goyal, Alka Gaba, Vol.2, Issue 5, May, 2013
Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic
Amit Khajuria, Roshan Srivastava, Vol.2, Issue 5, May, 2013
Online Voting System Using Biometric Security
Akash Wagadre, Bhagyashree B. Thorat, Stuti Sharma, Vol.2, Issue 5, May, 2013
M-Banking using Steganography and Cued Click Points
Ms. Vaishali Baviskar, Mayur Sanpurkar, Amit Patel, Makarand Jadhav, Gaurav Modi, Vol.2, Issue 5, May, 2013
Asynchronous Rollback Recovery in Cluster Based Multi Hop Mobile Ad Hoc Networks
Awadhesh Kumar Singh, Parmeet Kaur Jaggi, Vol.2, Issue 5, May, 2013