DSpace@nitr >

Browsing All of DSpace by Title

Jump to:  0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:   

Showing items 1709-1729 of 2067.

Previous page Next page
Date of IssueTitle Authors
2012 Rourkela steel plant rolls out successful people strategy: Organization transformed into the pride of IndiaSharma, R; Sahoo, C K
May-2013 Safey Risk Analysis and Risk Management in MinesTripathy, D P
2004 A scalable and collision-free MAC protocol for all optical ring networksTuruk, A K; Kumar, R
Jan-2011 Scalable Distributed Diagnosis Algorithm for Wireless Sensor NetworksMahapatro, A; Khilar, Pabitra Mohan
Jan-2011 Scanning Electron Microscopy as an Analytical Tool for Particle Size Distribution and Aspect Ratio Analysis of Ciprofloxacin Mucoadhesive Polymeric SuspensionSahoo, S; Chakraborti, C K; Mishra, S C; Nanda, U N
Dec-2010 SCMRP: Secure Cluster Based Multipath Routing Protocol for Wireless Sensor NetworksSharma, S K; Jena, S K
Nov-2011 Scope of application of L.E.D. lighting systems over conventional lighting arrangements in open cast minesHitesh, M; Jayanthu, S
Nov-2011 Scope of mining on the moon - a critical appraisalJayanthu, S; Tripathi, B; Sandeep, A
Mar-2012 Score level fusion of sift and surf for IRISBakshi, S; Das, Sujata; Mehrotra, H; Sa, Pankaj K
Aug-2013 Screening of biogenic amine production by lactobacillus SPP. And development of functional food, tea curdSahoo, M; Sahoo, B; Dash, I; Ajay, D; Jayabalan, R
2002 Scrubbing of Fly-Ash Laden SO2 in Modified Multistage Bubble Column ScrubberMeikap, B C; Kundu, G; Biswas, M N
1983 A second law analysis of the concentric tube heat exchanger: optimisation of wall conductivityChowdhury, K; Sarangi, S K
Oct-2009 Second Law based Optimisation of Crossflow Plate -fin Heat Exhcnager Design using Genetic AlgorithmMishra, M; Das, P K; Sarangi, S K
2009 Second order difference based detection and directional weighted median filter for removal of random valued impulsive noiseSa, Pankaj K; Dash, R; Majhi, B
Dec-2011 A Secure and EfficientMessage Authentication Protocol for VANETs with Privacy PreservationMishra, B; Panigrahy, S K; Tripathy, T C; Jena, D; Jena, S K
2009 A Secure AODV Routing Scheme with Reduced Data Packet Delay in MANETMishra, Alekha Kumar; Sahoo, Bibhudatta
2002 Secure Database Design, A comparison of Object database vs. Relational Database Security at SQL levelSahoo, Bibhudatta; Balaram Prasad, M
Mar-2010 A Secure e-Shopping Using Voice OrderingPanigrahy, S K; Jena, D; Jena, S K
2010 A Secure Multi authority Electronic Voting Protocol based on Blind SignatureMohanty, Sujata; Majhi, B
2009 Securing FSR against Data Packet Dropping by Malicious NodesSenapati, Sunil Kumar; Khilar, Pabitra Mohan
Feb-2011 Security in Bluetooth, RFID and Wireless Sensor NetworksPanigrahy, S K; Jena, S K; Turuk, A K
Previous page Next page

 

Powered by DSpace Feedback