Downloads :-
Cross Layer Approach For Routing Protocol and Manet
Priyanka Makwana, Dhavalsinh Gohil, Vol. 3, Issue 2, February, 2014
An efficient Software Quality Estimation: Critical Review
Mr. Asif Ali, Dr. Kavita Choudhary, Dr. Ashwini Sharma, Vol. 3, Issue 2, February, 2014
Survey: Crop Classification using Transform Domain Technique
Prof. Nilay Desai, Prof. Chintan Desai, Yash Naik, Vol 3., Issue 1, January, 2014
A Cost / Benefit / Risk (CBR) Analysis Methodology and its Application in a Computing System
Dr. Rajiv Srivastava, Vol 3., Issue 1, January, 2014
Reducing Database Security Implementation Gaps
Dr. Mohammad Iqbal, Dr. Farid Ahmad, Dr. Manoj Kumar Singh, (ETHIOPIA), Vol 3., Issue 1, January, 2014
Analysis on protection coordination of protective devices with a fault current limiter in the application location of a dispersed generation
M. Vinoth kannan, S. Rajanbabu, Vol. 3, Issue 2, February, 2014
Tuning of PID controller for Electro-hydraulic servo system using Soft Computing techniques - A Review
Sachin Kumar Mishra, Kuldeep Swarnkar, Vol. 3, Issue 2, February, 2014
Design of a Smart Power Transformer Oil Condition Monitoring & Checking System
Mohammed Sabri A. Raheem, (IRAQ), Vol. 3, Issue 2, February, 2014
Generating Automated Test Cases using Model Based Testing
Prof. Kirti Patil, Prof. M. M. Ganeshwade, Vol. 3, Issue 2, February, 2014
Sustainable IT: A Realisation Survey Among Academic Institutions of Iraq
Ali J. Abboud, Omar S. Saleh, (IRAQ), Vol. 3, Issue 2, February, 2014