Previous Issue
S.No |
TABLE OF CONTENT (IJESRT, 1(7):September -2012) |
Page No. |
PDF
|
1 | Trusted Operating System Approach for Security of an OS with JAVA. Gaurav Indoria*1, Kamlesh Lakhwani2 |
361-368 |
|
2 | Effect of Wind velocity At different Yaw Angle On Top Loss Coefficient of Solar Flat Plate collector An Experimental Study.. A.V. Rabadiya*1, Ravindra Kirar2, S.V. Ballar3 |
369-374 |
|
3 | Challenges In Computer Science. S. Divya Meena |
375-377 |
|
4 | Computer Science And Ethics. Ankur Singh Bist*1, Sandeep Singh2 |
378-380 |
|
5 | Working Condition And Its Effect On Productivity. Vimal Chaudhari*1, Prashant Pandey2 |
381-384 |
|
6 | Simulation And Theoretical Calculation of Fluid Pass Through Straight Circular Pipe And Nozzle. Sumit Suhagiya*1, RavindraKirar2, Chandramani Goswami3 |
385-388 |
|
7 | SUSTAINABILITY “a step forward to Land Grant Pattern”. Ankur Singh Bist*1, Kalpana Bisht2, Saurabh Pargaien3 |
389-393 |
|
8 | Determine The Factors Affecting On Productivity . Vimal Chaudhari*1, Prashant Pandey2 |
394-398 |
|
9 | Improve Security in a Software Development Life Cycle. Ruchi Dabey *1, Vishnu Kumar 2 |
399-405 |
|
10 | An Algorithmic Approach to Improve Routing Efficiency in Mobile Ad – Hoc Network. Anil Kumar*1, Savita Shiwani2 |
406-409 |
|
11 | A Survey- Use of Software Quality Attributes For Web Based Software Applications. Monica Raghuvanshi*1, Anurag Punde2 |
410-412 |
|
12 | Comprehensive Study of Different Pattern Matching Intrusion Detection Techniques. Deepak Agrawal*1, Anurag Punde2, Sonu Choudhary3, Preeti Kushwah4 |
413-417 |
|
13 | Transient Stability Analysis Of Power System Using Matlab. P R Sharma*1, Narender Hooda2 |
418-422 |
|
14 | Modelling and Simulation of 6-pulse Static Synchronous Compensator for voltage Stabilty in power system. P R Sharma*1, Narender Hooda2 |
423-427 |
Previous Issues
Issues @IJESRT!
International Journal of Engineering Sciences & Research Technology