×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
a-probabilistic-energy-efficient-routing-protocol-for-asymmetric-sensor-networks-IJERTCONV3IS13013.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
a-probabilistic-energy-efficient-routing-protocol-for-asymmetric-sensor-networks-IJERTCONV3IS13013.pdf
PDF
2 years ago
446.13 kB
Copy Link
a-system-to-filter-undesired-post-from-osn-user-space-using-nlp-IJERTCONV3IS13012.pdf
PDF
2 years ago
162.16 kB
Copy Link
dpaas-with-secure-data-forwarding-IJERTCONV3IS13001.pdf
PDF
2 years ago
385.17 kB
Copy Link
an-efficient-approach-for-classification-and-recommendation-of-mobile-apps-with-security-IJERTCONV3IS13009.pdf
PDF
2 years ago
536.70 kB
Copy Link
cancer-mass-detection-from-mammogram-based-on-enhanced-feature-extraction-method-IJERTCONV3IS13008.pdf
PDF
2 years ago
398.04 kB
Copy Link
design-and-development-of-new-generartion-3d-holographic-stamp-for-firm-authentication-IJERTCONV3IS13002.pdf
PDF
2 years ago
550.02 kB
Copy Link
cancer-therapeutics-based-on-gene-expression-data-a-distributed-approach-IJERTCONV3IS13007.pdf
PDF
2 years ago
242.59 kB
Copy Link
data-mining-with-big-data-IJERTCONV3IS13003.pdf
PDF
2 years ago
240.57 kB
Copy Link
a-novel-energy-saving-scheme-using-potential-based-dynamic-routing-in-wireless-sensor-networks-IJERTCONV3IS13014.pdf
PDF
2 years ago
287.19 kB
Copy Link
data-duplication-detection-and-avoidance-in-data-collection-applications-IJERTCONV3IS13004.pdf
PDF
2 years ago
621.02 kB
Copy Link
replacement-of-fault-node-in-wireless-sensor-networks-IJERTCONV3IS13023.pdf
PDF
2 years ago
359.57 kB
Copy Link
sensor-movement-using-pareto-optimal-matching-and-spanning-construction-IJERTCONV3IS13022.pdf
PDF
2 years ago
188.82 kB
Copy Link
genetic-algorithm-based-method-for-identification-of-cybercriminal-networks-from-online-social-media-IJERTCONV3IS13005.pdf
PDF
2 years ago
390.98 kB
Copy Link
slm-based-holographic-data-encryption-for-security-IJERTCONV3IS13021.pdf
PDF
2 years ago
392.49 kB
Copy Link
coala-system-for-visual-representation-of-cryptography-algorithms-IJERTCONV3IS13006.pdf
PDF
2 years ago
777.94 kB
Copy Link
social-network-data-analysis-and-menaces-detection-of-email-users-IJERTCONV3IS13020.pdf
PDF
2 years ago
400.46 kB
Copy Link
a-bio-cryptosystem-to-mitigate-fingerprint-uncertainty-based-on-modified-voronoi-neighbor-structures-IJERTCONV3IS13016.pdf
PDF
2 years ago
408.51 kB
Copy Link
surface-plasmon-holography-for-security-application-IJERTCONV3IS13019.pdf
PDF
2 years ago
411.90 kB
Copy Link
implementing-rfid-information-security-system-IJERTCONV3IS13032.pdf
PDF
2 years ago
271.87 kB
Copy Link
comparative-performance-analysis-of-jl-dg-mosfet-with-underlap-jl-dg-mosfet-IJERTCONV3IS25020.pdf
PDF
2 years ago
497.51 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.