×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
automatic-image-conversion-from-2d-to-3d-using-support-vector-machine-IJERTCONV2IS13118.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
automatic-image-conversion-from-2d-to-3d-using-support-vector-machine-IJERTCONV2IS13118.pdf
PDF
2 years ago
807.88 kB
Copy Link
offloading-mobile-computations-to-cloud-to-save-mobile-energy-IJERTCONV2IS13117.pdf
PDF
2 years ago
303.70 kB
Copy Link
a-semi-fragile-multiple-authentication-technique-for-authentication-and-restoration-in-digital-images-IJERTCONV2IS13119.pdf
PDF
2 years ago
215.75 kB
Copy Link
object-detection-via-random-subspace-classifiers-in-partially-occluded-images-IJERTCONV2IS13116.pdf
PDF
2 years ago
555.65 kB
Copy Link
high-speed-fpga-based-elliptic-curve-cryptography-using-mixed-coordinates-IJERTCONV2IS13120.pdf
PDF
2 years ago
661.04 kB
Copy Link
a-hybrid-approach-of-image-coding-using-neural-network-and-wavelet-transform-IJERTCONV2IS13115.pdf
PDF
2 years ago
283.08 kB
Copy Link
cloudmov-cloud-based-mobile-social-tv-IJERTCONV2IS13001.pdf
PDF
2 years ago
743.24 kB
Copy Link
the-various-essential-techniques-to-detect-prostate-cancer-IJERTCONV2IS13114.pdf
PDF
2 years ago
477.68 kB
Copy Link
secure-data-sharing-for-dynamic-groups-in-the-cloud-IJERTCONV2IS13002.pdf
PDF
2 years ago
114.50 kB
Copy Link
accurate-detection-of-human-in-the-presence-of-occlusion-IJERTCONV2IS13113.pdf
PDF
2 years ago
357.12 kB
Copy Link
preserving-privacy-of-cloud-data-using-homomorphic-encryption-IJERTCONV2IS13003.pdf
PDF
2 years ago
209.76 kB
Copy Link
human-object-extraction-in-videos-using-motion-saliency-IJERTCONV2IS13130.pdf
PDF
2 years ago
501.92 kB
Copy Link
off-path-hacking-the-illusion-of-challenge-response-authentication-IJERTCONV2IS13054.pdf
PDF
2 years ago
442.73 kB
Copy Link
improving-performance-in-public-cloud-using-cloud-partitioning-and-game-theory-IJERTCONV2IS13129.pdf
PDF
2 years ago
232.85 kB
Copy Link
analysis-on-optimal-multicast-capacity-and-delay-tradeoffs-in-manets-IJERTCONV2IS13065.pdf
PDF
2 years ago
337.41 kB
Copy Link
automatic-intima-media-thickness-detection-from-the-ultrasound-sequence-from-the-carotid-artery-IJERTCONV2IS13128.pdf
PDF
2 years ago
416.63 kB
Copy Link
vehicular-traffic-violation-controlling-system-using-big-data-technologies-IJERTCONV5IS19026.pdf
PDF
2 years ago
246.27 kB
Copy Link
secure-biometrics-and-biometric-types-IJERTCONV2IS13127.pdf
PDF
2 years ago
418.76 kB
Copy Link
a-survey-on-secure-cross-user-deduplication-techniques-on-cloud-storage-IJERTCONV5IS19027.pdf
PDF
2 years ago
404.65 kB
Copy Link
a-novel-image-steganogrphy-using-improved-lsb-method-IJERTCONV2IS13126.pdf
PDF
2 years ago
344.16 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.