×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
multi-query-optimization-using-heuristic-apporach-and-flow-of-optimizer-to-evaluate-cost-with-the-use-of-greedy-technique-IJERTV2IS3675.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
multi-query-optimization-using-heuristic-apporach-and-flow-of-optimizer-to-evaluate-cost-with-the-use-of-greedy-technique-IJERTV2IS3675.pdf
PDF
2 years ago
460.10 kB
Copy Link
moisture-content-control-during-cattle-feed-production-an-spc-based-approach-IJERTV2IS3608.pdf
PDF
2 years ago
471.12 kB
Copy Link
silent-networking-using-fuzzy-logic-for-power-saving-in-networked-devices-IJERTV2IS3659.pdf
PDF
2 years ago
290.49 kB
Copy Link
how-to-secure-ad-hoc-on-demand-distance-vector-aodv-routing-protocol-under-black-hole-attack-in-manet-IJERTV2IS3747.pdf
PDF
2 years ago
127.91 kB
Copy Link
a-survey-on-architectural-design-of-bloom-filter-for-signature-detection-IJERTV2IS3679.pdf
PDF
2 years ago
344.80 kB
Copy Link
methanolysis-and-ethanolysis-of-raw-hemp-oil-biodiesel-production-and-fuel-characterization-IJERTV2IS3620.pdf
PDF
2 years ago
407.51 kB
Copy Link
fault-identification-of-hvdc-converter-using-artificial-neural-network-IJERTV2IS3663.pdf
PDF
2 years ago
340.78 kB
Copy Link
anomaly-based-intrusion-detection-and-prevention-system-IJERTV2IS3611.pdf
PDF
2 years ago
171.39 kB
Copy Link
queue-processing-transmit-a-packet-from-source-to-destination-IJERTV2IS3724.pdf
PDF
2 years ago
139.76 kB
Copy Link
study-of-feature-driven-development-using-the-concepts-of-object-oriented-programming-system-IJERTV2IS3597.pdf
PDF
2 years ago
925.50 kB
Copy Link
applications-of-meromorphic-univalent-functions-associated-with-differential-subordination-IJERTV2IS3595.pdf
PDF
2 years ago
522.81 kB
Copy Link
implementation-of-hybrid-metrics-to-evaluate-software-performance-encapsulating-ck-metrics-IJERTV2IS3677.pdf
PDF
2 years ago
978.74 kB
Copy Link
performance-of-mimo-channel-over-siso-IJERTV2IS3693.pdf
PDF
2 years ago
634.55 kB
Copy Link
analysis-of-garment-dyeing-on-cotton-terry-fabric-by-using-natural-dyes-IJERTV2IS4090.pdf
PDF
2 years ago
459.42 kB
Copy Link
a-hybrid-approach-for-edge-detection-using-fuzzy-logic-and-canny-method-IJERTV2IS3496.pdf
PDF
2 years ago
459.40 kB
Copy Link
cloud-computing-IJERTV2IS4342.pdf
PDF
2 years ago
262.22 kB
Copy Link
a-new-approach-to-symmetric-key-generation-using-combination-of-biometrics-key-and-cryptographic-key-to-enhance-security-of-data-IJERTV2IS3624.pdf
PDF
2 years ago
447.38 kB
Copy Link
enhancing-security-of-image-by-steganography-using-reversible-texture-synthesis-IJERTV6IS080151.pdf
PDF
2 years ago
250.05 kB
Copy Link
novel-techniques-for-circumventing-the-glitch-effects-on-digital-circuits-for-low-power-vlsi-design-IJERTV2IS3210.pdf
PDF
2 years ago
733.58 kB
Copy Link
review-of-regression-analysis-models-IJERTV6IS080060.pdf
PDF
2 years ago
498.14 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.