×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
improving-performance-in-public-cloud-using-cloud-partitioning-and-game-theory-IJERTCONV2IS13129.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
improving-performance-in-public-cloud-using-cloud-partitioning-and-game-theory-IJERTCONV2IS13129.pdf
PDF
2 years ago
232.85 kB
Copy Link
automatic-intima-media-thickness-detection-from-the-ultrasound-sequence-from-the-carotid-artery-IJERTCONV2IS13128.pdf
PDF
2 years ago
416.63 kB
Copy Link
human-object-extraction-in-videos-using-motion-saliency-IJERTCONV2IS13130.pdf
PDF
2 years ago
501.92 kB
Copy Link
secure-biometrics-and-biometric-types-IJERTCONV2IS13127.pdf
PDF
2 years ago
418.76 kB
Copy Link
accurate-detection-of-human-in-the-presence-of-occlusion-IJERTCONV2IS13113.pdf
PDF
2 years ago
357.12 kB
Copy Link
a-novel-image-steganogrphy-using-improved-lsb-method-IJERTCONV2IS13126.pdf
PDF
2 years ago
344.16 kB
Copy Link
the-various-essential-techniques-to-detect-prostate-cancer-IJERTCONV2IS13114.pdf
PDF
2 years ago
477.68 kB
Copy Link
an-emd-based-speech-enhancement-using-adaptive-thresholding-techniques-IJERTCONV2IS13124.pdf
PDF
2 years ago
1.72 MB
Copy Link
a-hybrid-approach-of-image-coding-using-neural-network-and-wavelet-transform-IJERTCONV2IS13115.pdf
PDF
2 years ago
283.08 kB
Copy Link
automatic-learning-based-2d-to-3d-image-conversion-IJERTCONV2IS13123.pdf
PDF
2 years ago
583.39 kB
Copy Link
object-detection-via-random-subspace-classifiers-in-partially-occluded-images-IJERTCONV2IS13116.pdf
PDF
2 years ago
555.65 kB
Copy Link
image-steganography-using-neural-networks-IJERTCONV2IS13122.pdf
PDF
2 years ago
300.76 kB
Copy Link
offloading-mobile-computations-to-cloud-to-save-mobile-energy-IJERTCONV2IS13117.pdf
PDF
2 years ago
303.70 kB
Copy Link
efficient-feature-selection-by-reducing-redundant-features-from-high-dimensional-data-using-clustering-IJERTCONV2IS13140.pdf
PDF
2 years ago
185.26 kB
Copy Link
automatic-image-conversion-from-2d-to-3d-using-support-vector-machine-IJERTCONV2IS13118.pdf
PDF
2 years ago
807.88 kB
Copy Link
quantitative-evaluation-of-web-page-attributes-for-improving-the-quality-of-website-IJERTCONV2IS13139.pdf
PDF
2 years ago
246.77 kB
Copy Link
a-semi-fragile-multiple-authentication-technique-for-authentication-and-restoration-in-digital-images-IJERTCONV2IS13119.pdf
PDF
2 years ago
215.75 kB
Copy Link
a-complete-framework-of-web-usage-mining-IJERTCONV2IS13138.pdf
PDF
2 years ago
158.32 kB
Copy Link
high-speed-fpga-based-elliptic-curve-cryptography-using-mixed-coordinates-IJERTCONV2IS13120.pdf
PDF
2 years ago
661.04 kB
Copy Link
horizontal-aggregations-in-sql-to-prepare-data-sets-for-data-mining-analysis-IJERTCONV2IS13137.pdf
PDF
2 years ago
230.34 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.