×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
enhancing-security-of-image-by-steganography-using-reversible-texture-synthesis-IJERTV6IS080151.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
enhancing-security-of-image-by-steganography-using-reversible-texture-synthesis-IJERTV6IS080151.pdf
PDF
2 years ago
250.05 kB
Copy Link
review-of-regression-analysis-models-IJERTV6IS080060.pdf
PDF
2 years ago
498.14 kB
Copy Link
cloud-computing-IJERTV2IS4342.pdf
PDF
2 years ago
262.22 kB
Copy Link
a-review-of-various-frequency-drift-based-islanding-detection-methods-IJERTV6IS080035.pdf
PDF
2 years ago
266.59 kB
Copy Link
analysis-of-garment-dyeing-on-cotton-terry-fabric-by-using-natural-dyes-IJERTV2IS4090.pdf
PDF
2 years ago
459.42 kB
Copy Link
study-on-partial-replacement-of-fine-aggregate-by-quarry-rock-dust-in-high-volume-flyash-concrete-IJERTV6IS080031.pdf
PDF
2 years ago
1,004.39 kB
Copy Link
implementation-of-hybrid-metrics-to-evaluate-software-performance-encapsulating-ck-metrics-IJERTV2IS3677.pdf
PDF
2 years ago
978.74 kB
Copy Link
stress-and-failure-analysis-of-thick-walled-cylinder-with-oblique-hole-IJERTV6IS080017.pdf
PDF
2 years ago
1.03 MB
Copy Link
study-of-feature-driven-development-using-the-concepts-of-object-oriented-programming-system-IJERTV2IS3597.pdf
PDF
2 years ago
925.50 kB
Copy Link
a-predictive-model-to-predict-seed-classes-using-machine-learning-IJERTV6IS080153.pdf
PDF
2 years ago
512.86 kB
Copy Link
anomaly-based-intrusion-detection-and-prevention-system-IJERTV2IS3611.pdf
PDF
2 years ago
171.39 kB
Copy Link
solvent-extraction-of-rare-earth-elements-from-the-mineralized-calcareous-shale-of-wadi-nasib-area-sinai-egypt-IJERTV6IS080094.pdf
PDF
2 years ago
660.28 kB
Copy Link
methanolysis-and-ethanolysis-of-raw-hemp-oil-biodiesel-production-and-fuel-characterization-IJERTV2IS3620.pdf
PDF
2 years ago
407.51 kB
Copy Link
comparative-analysis-of-composite-materials-by-using-finite-element-method-IJERTV6IS080173.pdf
PDF
2 years ago
1.01 MB
Copy Link
how-to-secure-ad-hoc-on-demand-distance-vector-aodv-routing-protocol-under-black-hole-attack-in-manet-IJERTV2IS3747.pdf
PDF
2 years ago
127.91 kB
Copy Link
evaluation-of-routing-protocols-of-manet-in-homogeneous-and-heterogeneous-networks-IJERTV6IS080163.pdf
PDF
2 years ago
510.95 kB
Copy Link
moisture-content-control-during-cattle-feed-production-an-spc-based-approach-IJERTV2IS3608.pdf
PDF
2 years ago
471.12 kB
Copy Link
punching-of-high-strength-concrete-flat-slabs-without-shear-reinforcement-IJERTV6IS080143.pdf
PDF
2 years ago
913.88 kB
Copy Link
multi-query-optimization-using-heuristic-apporach-and-flow-of-optimizer-to-evaluate-cost-with-the-use-of-greedy-technique-IJERTV2IS3675.pdf
PDF
2 years ago
460.10 kB
Copy Link
study-on-effect-of-gradients-on-pcu-and-capacity-factor-for-undivided-two-lane-national-highway-nh-209-IJERTV6IS080130.pdf
PDF
2 years ago
754.54 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.