Publishers of Refereed Open Access Indexed Journals
Archive
IJMRS's International Journal of Engineering Sciences, ISSN 2277-9698 ( Volume 02, Issue 02, Jun. 2013 )
1.
Timeseries Modeling of Stream Flows of River Kaduna, (Using Ma, Ar, and Arima Models)
A. Saminu, I. Abdullahi, F.O.P. Oriola
2.
Software Component Quality Models from ISO 9126 Perspective: A Review
Sonu Mittal, Pradeep Kumar Bhatia
3.
Pharmacognostic Effects of Aloe Vera and Ocimum Sanctum Leaves On Streptococcus Mutans Causing Dental Caries
Sheeba Samson , Sheel Singh
4.
Evaluation of Residual Stresses in Bimetallic Welds
Rajesh
5.
Evaluation of Future Dielectric Material (High-k Gate Dielectrics of Thin Films) for MOS Technology
Nisha, Jitender Khurana, Amardeep
6.
Review and Analysis of a Low-Noise, CMOS Voltage Controlled Oscillator
Lalina, Ajay Dagar, Yogesh
7.
Optimized Fast Data Collection in Tree Based Wireless Sensor Networks
Shamsher Singh, Meenakshi Kaushik
8.
Optimized Secure Energy Efficient Ant Based Routing
Kapil Chawla, Rupali Malhotra
9.
Fingerprint Based Recognition
Shivani
10.
A Study on Different Technique of Code Clone
Geeta Chugh, Neelam Shrivastva
11.
Improved QOS in Wireless Body Area Network (WBAN) using Mobility Model
Isha Sharma
12.
Securing Wireless Networks by Detecting, Analyzing and Designing Efficient from Masquerade Attacks
Deepak, Harkesh Sehrawat
13.
A Review of Software Complexity Metrics
Sudhir
14.
A Review of Software Reliability and Proactive & Reactive Approach
Yitish Kukreja, Rupali Malhotra
15.
Comparative Analysis of Energy Efficient Mac Protocol for Wireless Sensor Networks
Manju Yadav, Bijender Mehandia
16.
Overview of Routing Protocol in MANET
Manoj Nandal, Neetu Sharma
17.
Genetic Algorithm for Multiprocessors Task Scheduling: A Review
Savita Narang, Sunita Dhingra
18.
Reliability Analysis of Automated System
Manik Sikka, Samit Yadav
19.
VHDL Implementation of Programmable BIST using FSM
Hitanshu Saluja, Anuj
20.
Code Cloning Matching Ratio and Information Search Technique
Geeta Chugh, Neelam Shrivastva
21.
Fingerprint Recognition Techniques: A Critical Review
Nitika, Nasib Singh Gill
22.
Analysis of WLAN Security and Attack Tests on WLAN
Neha Dhawan, Garima Chaudhary
23.
Security Issues In Mobile Ad-hoc Network with Implication of Key Management
Shilpa Bansal, Dinesh Kumar
24.
Cloud Computing: An Economical Resource Sharing Approach
Subita Kumari, Sonia
25.
A Review on Web Data Mining
Aseem Malhotra, Shikha Takkar
26.
Transient Analysis of Cooling Load
Sachin Gupta, Arvind Gupta
27.
A Review of Image Compression Techniques
Deepak Sharma, Vikas Sindhu
28.
Review of Security Techniques in MANET
Divya Aggarwal
    Copyright © 2013 ijmrs.com