×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
text-localisation-from-natural-scene-images-comparison-of-various-pre-processing-and-edge-detection-methods-IJERTCONV3IS30001.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
text-localisation-from-natural-scene-images-comparison-of-various-pre-processing-and-edge-detection-methods-IJERTCONV3IS30001.pdf
PDF
2 years ago
308.43 kB
Copy Link
micro-structure-of-bitcoin-transaction-process-IJERTCONV3IS30015.pdf
PDF
2 years ago
251.78 kB
Copy Link
steganography-a-data-hiding-technique-IJERTCONV3IS30002.pdf
PDF
2 years ago
389.53 kB
Copy Link
multilevel-darwinist-brain-mdb-lifelong-learning-by-evolution-in-real-robots-IJERTCONV3IS30014.pdf
PDF
2 years ago
171.27 kB
Copy Link
online-ad-manager-based-on-autonomic-principles-IJERTCONV3IS30013.pdf
PDF
2 years ago
404.81 kB
Copy Link
patient-monitoring-system-by-using-wired-and-wireless-sensors-IJERTCONV3IS30012.pdf
PDF
2 years ago
209.59 kB
Copy Link
sixth-sense-technology-IJERTCONV3IS30003.pdf
PDF
2 years ago
394.92 kB
Copy Link
prediction-of-students-academic-performance-using-data-mining-analysis-IJERTCONV3IS30011.pdf
PDF
2 years ago
308.77 kB
Copy Link
semantic-web-framework-for-improved-e-governance-IJERTCONV3IS30004.pdf
PDF
2 years ago
206.77 kB
Copy Link
privacy-preservation-in-data-mining-with-cyber-security-IJERTCONV3IS30010.pdf
PDF
2 years ago
595.21 kB
Copy Link
radial-basis-function-network-for-hourly-surface-temperature-prediction-IJERTCONV3IS30009.pdf
PDF
2 years ago
292.96 kB
Copy Link
optimal-resource-allocation-schedulingduring-adversity-recovery-plan-IJERTV2IS100228.pdf
PDF
2 years ago
483.24 kB
Copy Link
review-on-single-nucleotide-polymorphism-analysis-methods-IJERTCONV3IS30005.pdf
PDF
2 years ago
518.14 kB
Copy Link
smart-library-system-IJERTV2IS100185.pdf
PDF
2 years ago
1.08 MB
Copy Link
review-on-network-security-aspects-introduction-to-vulnerabilities-threats-and-attacks-IJERTCONV3IS30006.pdf
PDF
2 years ago
337.63 kB
Copy Link
lossy-coding-of-speech-signals-using-subband-coding-IJERTCONV3IS16035.pdf
PDF
2 years ago
624.55 kB
Copy Link
using-smartphone-as-an-intelligent-pc-controller-IJERTV2IS100474.pdf
PDF
2 years ago
277.89 kB
Copy Link
automatic-generation-of-test-codes-to-detect-permanent-faults-in-vliw-processor-IJERTCONV3IS16184.pdf
PDF
2 years ago
357.52 kB
Copy Link
theoretical-survey-on-secure-hash-functions-and-issues-IJERTV2IS100449.pdf
PDF
2 years ago
250.04 kB
Copy Link
secured-healthcare-and-patient-monitoring-system-using-vanet-based-wban-IJERTCONV3IS16185.pdf
PDF
2 years ago
727.39 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.