×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
an-agent-based-approach-to-secure-real-time-auction-system-using-trust-management-module-with-image-encryption-IJERTCONV3IS27090.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
an-agent-based-approach-to-secure-real-time-auction-system-using-trust-management-module-with-image-encryption-IJERTCONV3IS27090.pdf
PDF
2 years ago
262.70 kB
Copy Link
re-ranked-image-search-using-query-keyword-IJERTCONV3IS27091.pdf
PDF
2 years ago
465.78 kB
Copy Link
multiple-face-detection-and-recognition-in-real-time-using-open-cv-IJERTCONV3IS27089.pdf
PDF
2 years ago
501.51 kB
Copy Link
background-subtraction-in-complex-scenarios-using-spatio-temporal-model-IJERTCONV3IS27088.pdf
PDF
2 years ago
376.73 kB
Copy Link
i-recognise-u-raspberry-pi-based-wearable-face-recognition-device-with-image-tagging-facility-for-blind-IJERTCONV3IS27092.pdf
PDF
2 years ago
Get Size
Copy Link
reboost-image-segmentation-using-genetic-algorithm-IJERTCONV3IS27087.pdf
PDF
2 years ago
398.95 kB
Copy Link
atm-deployment-using-rank-based-genetic-algorithm-IJERTCONV3IS27112.pdf
PDF
2 years ago
Get Size
Copy Link
survey-on-data-routing-for-in-network-aggregation-a-lightweight-and-reliable-routing-approach-for-in-network-aggregation-in-wireless-sensor-networks-IJERTCONV3IS27086.pdf
PDF
2 years ago
Get Size
Copy Link
detection-and-prevention-technique-for-mitigating-warmhole-attack-in-wireless-sensor-network-IJERTCONV3IS27076.pdf
PDF
2 years ago
Get Size
Copy Link
a-survey-on-outage-analysis-in-cognitive-two-way-relay-network-with-opportunistic-relay-selection-under-primary-users-interference-IJERTCONV3IS27085.pdf
PDF
2 years ago
Get Size
Copy Link
c-ran-supporting-multi-rats-for-5g-mobile-networks-IJERTCONV3IS27077.pdf
PDF
2 years ago
Get Size
Copy Link
an-introduction-to-data-aggregation-techniques-in-wireless-sensor-networks-and-their-application-IJERTCONV3IS27084.pdf
PDF
2 years ago
Get Size
Copy Link
inspection-of-deep-packet-inspection-in-real-time-for-performance-testing-a-framework-IJERTCONV3IS27078.pdf
PDF
2 years ago
Get Size
Copy Link
security-for-source-node-privacy-and-maximizing-network-lifetime-through-routing-in-wireless-sensor-networks-IJERTCONV3IS27083.pdf
PDF
2 years ago
Get Size
Copy Link
classification-of-parkinsons-disease-by-comparing-multi-layer-perceptron-neural-network-and-least-square-support-vector-machine-IJERTCONV3IS27079.pdf
PDF
2 years ago
Get Size
Copy Link
malayalam-word-sense-disambiguation-using-maximum-entropy-model-IJERTCONV3IS30016.pdf
PDF
2 years ago
392.04 kB
Copy Link
is-your-filer-safe-the-implementation-challenges-in-nas-as-a-file-server-IJERTCONV3IS27080.pdf
PDF
2 years ago
Get Size
Copy Link
an-energy-efficient-and-reliable-data-aggregation-using-elephant-behavior-as-a-swarm-intelligence-in-wsn-IJERTCONV3IS27081.pdf
PDF
2 years ago
344.99 kB
Copy Link
a-survey-paper-on-data-mining-techniques-in-drug-industry-IJERTCONV3IS30025.pdf
PDF
2 years ago
Get Size
Copy Link
performing-sentiment-analysis-on-the-product-brands-using-tweets-IJERTCONV3IS27082.pdf
PDF
2 years ago
293.36 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.