×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
n012energy-management-in-a-wireless-sensor-network-based-on-cluster-head-selection-IJERTCONV3IS27075.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
n012energy-management-in-a-wireless-sensor-network-based-on-cluster-head-selection-IJERTCONV3IS27075.pdf
PDF
2 years ago
Get Size
Copy Link
a-survey-on-secure-data-aggregation-in-wireless-sensor-network-IJERTCONV3IS27074.pdf
PDF
2 years ago
Get Size
Copy Link
wireless-sensor-network-simulator-IJERTCONV3IS27064.pdf
PDF
2 years ago
Get Size
Copy Link
efficient-routing-protocol-with-trust-management-for-wireless-sensor-network-a-survey-IJERTCONV3IS27073.pdf
PDF
2 years ago
316.77 kB
Copy Link
securing-wireless-sensor-network-using-pbk-mechanism-IJERTCONV3IS27065.pdf
PDF
2 years ago
Get Size
Copy Link
performing-sentiment-analysis-on-the-product-brands-using-tweets-IJERTCONV3IS27082.pdf
PDF
2 years ago
293.36 kB
Copy Link
the-multipath-routing-and-intrusion-tolerance-for-redundancy-management-in-wireless-sensor-networks-IJERTCONV3IS27066.pdf
PDF
2 years ago
Get Size
Copy Link
an-energy-efficient-and-reliable-data-aggregation-using-elephant-behavior-as-a-swarm-intelligence-in-wsn-IJERTCONV3IS27081.pdf
PDF
2 years ago
344.99 kB
Copy Link
a-2ack-with-pfc-scheme-to-detect-misbehavior-nodes-in-manet-IJERTCONV3IS27067.pdf
PDF
2 years ago
Get Size
Copy Link
is-your-filer-safe-the-implementation-challenges-in-nas-as-a-file-server-IJERTCONV3IS27080.pdf
PDF
2 years ago
Get Size
Copy Link
optimized-aodv-protocol-for-minimizing-routing-path-within-mobile-nodes-in-ammet-IJERTCONV3IS27068.pdf
PDF
2 years ago
Get Size
Copy Link
classification-of-parkinsons-disease-by-comparing-multi-layer-perceptron-neural-network-and-least-square-support-vector-machine-IJERTCONV3IS27079.pdf
PDF
2 years ago
Get Size
Copy Link
secure-and-efficient-data-retrieval-under-location-based-server-in-military-networks-IJERTCONV3IS27069.pdf
PDF
2 years ago
Get Size
Copy Link
inspection-of-deep-packet-inspection-in-real-time-for-performance-testing-a-framework-IJERTCONV3IS27078.pdf
PDF
2 years ago
Get Size
Copy Link
dtn-technology-to-provide-security-to-the-military-networks-IJERTCONV3IS27070.pdf
PDF
2 years ago
Get Size
Copy Link
c-ran-supporting-multi-rats-for-5g-mobile-networks-IJERTCONV3IS27077.pdf
PDF
2 years ago
Get Size
Copy Link
key-encrypted-onion-routing-with-route-verification-for-manets-IJERTCONV3IS27071.pdf
PDF
2 years ago
Get Size
Copy Link
detection-and-prevention-technique-for-mitigating-warmhole-attack-in-wireless-sensor-network-IJERTCONV3IS27076.pdf
PDF
2 years ago
Get Size
Copy Link
detection-of-bots-and-bot-master-in-p2p-network-a-survey-IJERTCONV3IS27072.pdf
PDF
2 years ago
Get Size
Copy Link
atm-deployment-using-rank-based-genetic-algorithm-IJERTCONV3IS27112.pdf
PDF
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.