×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
detecting-attacks-in-usor-routing-protocol-for-manet-IJERTV3IS10546.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
detecting-attacks-in-usor-routing-protocol-for-manet-IJERTV3IS10546.pdf
PDF
2 years ago
498.56 kB
Copy Link
implementation-of-example-based-machine-translation-system-IJERTV3IS031474.pdf
PDF
2 years ago
790.82 kB
Copy Link
a-study-of-weibull-parameters-using-four-numerical-methods-to-analyze-the-wind-speed-at-jogimatti-in-india-IJERTV3IS20069.pdf
PDF
2 years ago
318.18 kB
Copy Link
study-of-job-layout-for-construction-project-IJERTV3IS110515.pdf
PDF
2 years ago
699.53 kB
Copy Link
exploration-of-several-page-rank-algorithms-for-link-analysis-IJERTV3IS20186.pdf
PDF
2 years ago
576.45 kB
Copy Link
optimizing-crop-irrigation-through-rf-enabled-centralized-controlling-station-IJERTV3IS110501.pdf
PDF
2 years ago
359.58 kB
Copy Link
analysis-of-power-quality-improvement-in-voltage-sag-and-load-sensitivity-using-fuzzy-logic-IJERTV3IS20174.pdf
PDF
2 years ago
473.78 kB
Copy Link
a-review-hierarchial-clustering-method-IJERTV3IS110425.pdf
PDF
2 years ago
355.70 kB
Copy Link
a-parallel-algorithm-to-process-harmonic-progression-series-using-openmp-IJERTV3IS20329.pdf
PDF
2 years ago
724.63 kB
Copy Link
a-novel-system-for-substation-health-monitoring-IJERTV3IS110436.pdf
PDF
2 years ago
321.90 kB
Copy Link
an-encounter-based-approach-for-improving-security-and-privacy-in-tor-network-IJERTV3IS20377.pdf
PDF
2 years ago
487.17 kB
Copy Link
partial-discharge-pattern-recognition-of-hv-gis-by-using-artificial-neural-networks-IJERTV3IS110433.pdf
PDF
2 years ago
647.23 kB
Copy Link
alarm-for-renewable-energy-requirement-in-india-IJERTV3IS20194.pdf
PDF
2 years ago
395.40 kB
Copy Link
design-optimization-of-automotive-emission-system-using-computational-fluid-dynamics-IJERTV3IS110428.pdf
PDF
2 years ago
278.36 kB
Copy Link
load-balancing-algorithms-in-cloud-computing-environment-a-methodical-comparison-IJERTV3IS20061.pdf
PDF
2 years ago
157.16 kB
Copy Link
a-survey-on-search-based-web-facial-image-annotation-methods-IJERTV3IS110304.pdf
PDF
2 years ago
173.36 kB
Copy Link
an-identification-of-abnormal-images-using-semi-supervised-segmentation-model-IJERTV3IS20064.pdf
PDF
2 years ago
683.57 kB
Copy Link
dynamic-data-prioritization-technique-for-improving-quality-of-service-in-wireless-sensor-network-IJERTV3IS110504.pdf
PDF
2 years ago
217.41 kB
Copy Link
efficient-feature-subset-selection-using-kruskals-process-IJERTV3IS20080.pdf
PDF
2 years ago
389.54 kB
Copy Link
a-survey-on-privacy-preserving-data-mining-techniques-using-differential-privacy-IJERTV3IS110482.pdf
PDF
2 years ago
148.87 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.