×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
a-trust-based-agent-learning-model-for-service-composition-in-mobile-cloud-computing-environments-IJERTCONV8IS02020.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
a-trust-based-agent-learning-model-for-service-composition-in-mobile-cloud-computing-environments-IJERTCONV8IS02020.pdf
PDF
2 years ago
345.92 kB
Copy Link
data-mining-and-its-business-applications-IJERTCONV8IS02019.pdf
PDF
2 years ago
183.90 kB
Copy Link
performance-analysis-of-cryptographic-algorithms-in-the-information-security-IJERTCONV8IS02021.pdf
PDF
2 years ago
566.03 kB
Copy Link
analyzing-road-accident-data-using-association-rule-mining-IJERTCONV8IS02022.pdf
PDF
2 years ago
Get Size
Copy Link
wireless-smart-irrigation-system-IJERTCONV8IS01008.pdf
PDF
2 years ago
277.24 kB
Copy Link
efficient-two-sided-access-control-system-in-cloud-storage-IJERTCONV8IS02017.pdf
PDF
2 years ago
Get Size
Copy Link
recurrent-item-sets-mining-by-gap-seclusion-over-large-scale-data-IJERTCONV8IS02005.pdf
PDF
2 years ago
Get Size
Copy Link
survey-of-emerging-threats-in-cyber-security-IJERTCONV8IS02008.pdf
PDF
2 years ago
293.49 kB
Copy Link
network-security-with-cryptography-and-steganography-IJERTCONV8IS03010.pdf
PDF
2 years ago
185.61 kB
Copy Link
analysis-of-unreadable-fundus-images-obtained-in-a-telemedicine-screening-program-for-glaucoma-detection-IJERTCONV8IS02009.pdf
PDF
2 years ago
Get Size
Copy Link
automated-prediction-system-for-various-health-conditions-by-analysing-human-palms-and-nails-using-image-matching-technique-IJERTCONV8IS03009.pdf
PDF
2 years ago
267.40 kB
Copy Link
comparative-analysis-on-cluster-based-hierarchical-routing-protocols-for-wireless-sensor-networks-IJERTCONV8IS03008.pdf
PDF
2 years ago
Get Size
Copy Link
network-aware-dynamic-vm-placement-for-achieving-energy-efficient-greeny-data-centers-IJERTCONV8IS02010.pdf
PDF
2 years ago
Get Size
Copy Link
association-rule-mining-using-apriori-algorithm-for-extracting-product-sales-patterns-in-groceries-IJERTCONV8IS03007.pdf
PDF
2 years ago
Get Size
Copy Link
mobile-edge-computation-offloading-and-resource-allocation-mobile-multimedia-applications-in-wireless-networks-IJERTCONV8IS02011.pdf
PDF
2 years ago
316.47 kB
Copy Link
a-survey-on-consensus-mechanisms-and-mining-strategy-management-in-block-chain-network-IJERTCONV8IS02004.pdf
PDF
2 years ago
Get Size
Copy Link
real-time-data-diagnostic-architecture-for-satellite-image-mining-using-sift-algorithm-IJERTCONV8IS03006.pdf
PDF
2 years ago
249.94 kB
Copy Link
intrusion-detection-system-from-machine-learning-perspective-IJERTCONV8IS03005.pdf
PDF
2 years ago
Get Size
Copy Link
study-of-partial-shading-effects-on-photovoltaic-arrays-with-two-diode-model-IJERTV8IS090067.pdf
PDF
2 years ago
823.60 kB
Copy Link
using-reference-image-an-alternative-approach-of-steganography-IJERTCONV8IS03004.pdf
PDF
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.