×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
optimized-implementation-of-serial-binary-input-compressive-sensing-decoder-IJERTCONV3IS27042.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
optimized-implementation-of-serial-binary-input-compressive-sensing-decoder-IJERTCONV3IS27042.pdf
PDF
2 years ago
Get Size
Copy Link
general-processor-emulator-genproemu-IJERTCONV3IS27041.pdf
PDF
2 years ago
Get Size
Copy Link
trust-based-security-in-wireless-sensor-networks-using-game-theory-IJERTCONV3IS27030.pdf
PDF
2 years ago
Get Size
Copy Link
attendance-registry-system-ars-IJERTCONV3IS27040.pdf
PDF
2 years ago
Get Size
Copy Link
routing-in-socially-selfish-delay-tolerant-network-IJERTCONV3IS27031.pdf
PDF
2 years ago
Get Size
Copy Link
efficient-management-of-drip-irrigation-using-sensors-IJERTCONV3IS27039.pdf
PDF
2 years ago
Get Size
Copy Link
a-study-on-vehicular-ad-hoc-network-vanet-IJERTCONV3IS27032.pdf
PDF
2 years ago
Get Size
Copy Link
e-tracking-an-iot-application-for-social-welfare-IJERTCONV3IS27033.pdf
PDF
2 years ago
Get Size
Copy Link
usd-exchange-rate-forecasting-using-arima-mlp-and-recurrent-neural-networks-IJERTCONV3IS27038.pdf
PDF
2 years ago
Get Size
Copy Link
a-survey-on-monitoring-and-maintaining-the-traffic-in-waas-network-through-graphs-using-the-network-statistics-IJERTCONV3IS27057.pdf
PDF
2 years ago
Get Size
Copy Link
secured-redundancy-mechanism-to-detect-intrusion-in-heterogeneous-wireless-sensor-networks-IJERTCONV3IS27058.pdf
PDF
2 years ago
Get Size
Copy Link
a-survey-on-adaptive-traffic-engineering-system-based-on-virtual-routing-topologies-IJERTCONV3IS27059.pdf
PDF
2 years ago
Get Size
Copy Link
methodology-of-improving-efficiency-in-delay-tolerant-networks-IJERTCONV3IS27060.pdf
PDF
2 years ago
Get Size
Copy Link
efficient-transmission-of-data-by-a-sequence-of-clusters-for-a-dissruption-tolerant-network-IJERTCONV3IS27062.pdf
PDF
2 years ago
Get Size
Copy Link
efficient-peer-to-peer-file-sharing-based-on-network-coding-IJERTCONV3IS27061.pdf
PDF
2 years ago
Get Size
Copy Link
detection-of-bots-and-bot-master-in-p2p-network-a-survey-IJERTCONV3IS27072.pdf
PDF
2 years ago
Get Size
Copy Link
design-and-implementation-of-intrusion-detection-system-ids-for-detecting-denial-of-service-in-wireless-network-IJERTCONV3IS27063.pdf
PDF
2 years ago
Get Size
Copy Link
key-encrypted-onion-routing-with-route-verification-for-manets-IJERTCONV3IS27071.pdf
PDF
2 years ago
Get Size
Copy Link
in-network-data-aggregation-techniques-for-wsns-IJERTCONV3IS27053.pdf
PDF
2 years ago
Get Size
Copy Link
dtn-technology-to-provide-security-to-the-military-networks-IJERTCONV3IS27070.pdf
PDF
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.