Sl. No. |
TITLE |
Downloads |
1. |
Solution of Economic Dispatch Problem using Modified Cuckoo Search Algorithm |
 |
2. |
Optimization under Uncertainties of a Valveless Diaphragm Pump using the Cut-Cell Method |
 |
3. |
The Microenterprises in the Rural Context of Chalchicomula De Sesma, Puebla |
 |
4. |
The Potential Fishing Ground and Spatial Distribution Pattern of Albacore (Thunnusalalunga) in Eastern Indian Ocean |
 |
5. |
Geochemical Features of Rare Earth Elements in the Dolomites of the Bozdağ Formation (Early Silurian–Middle Devonian) from Söğütözü-Ladik (Konya/Turkey) Area |
 |
6. |
A New EDLC Electric Scooter with Pulse-Power Super-Rapid Charger |
 |
7. |
Expression of Pichia Pastoris-Derived Secreted Insulin Precursor |
 |
8. |
Scaling-up Mechanical Craft Practice Trade Facilities in Technical Colleges for Sustainable National Development in Rivers State |
 |
9. |
Mathematical Modeling of Three Phase Power Transformer Phase-Shift Compensation Differential Protection Using Star/Star Connected Current Transformers |
 |
10. |
Improved Template Matching Techniques for Unicode Character Recognition |
 |
11. |
Hydrological Characterization Of The Estuarian Bay Of Adiopo- Doume In Lagoon Ebrie (Cote D'ivoire) |
 |
12. |
High pressure thermal processing for inactivation of Bacillus amyloliquefaciens and Clostridium sporogenes spores in a range of low acid commercial preparedfoods |
 |
13. |
Developing a cheaper and more efficient solar heating swimming pool project: A case study |
 |
14. |
Proposal for a Smart Factory implementation Model based on Industry 4.0 |
 |
15. |
Analytical Study on Subgrade Soil Reactions to Octagonal Foundations of Industrial Pole-like Structures |
 |
16. |
Application Programming Interface (API) for Real time Churn Prediction Based on Customer Classification using Decision Tree and k-nearest neighbor |
 |
17. |
Fast Face Detection System Based On HEVCBitstream |
 |
18. |
Comparative Analysis of the Performance of Adjustable Windows
in the Processingof Noisy Voice Signals |
 |
19. |
Securing Data on Transmission from Man-In-The-Middle
Attacks Using Diffie Hell-Man Key Exchange Encryption
Mechanism |
 |