×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
face-recognition-using-transform-domain-and-overlapping-lbp-techniques-IJERTCONV2IS13099.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
face-recognition-using-transform-domain-and-overlapping-lbp-techniques-IJERTCONV2IS13099.pdf
PDF
2 years ago
519.59 kB
Copy Link
an-exploration-of-subspace-models-and-transformation-techniques-for-image-classification-IJERTCONV2IS13098.pdf
PDF
2 years ago
707.72 kB
Copy Link
biometric-inspired-digital-image-steganography-IJERTCONV2IS13100.pdf
PDF
2 years ago
405.29 kB
Copy Link
sds-algorithm-for-image-sharing-IJERTCONV2IS13097.pdf
PDF
2 years ago
425.56 kB
Copy Link
efficient-medical-image-watermarking-with-tamper-detection-and-recovery-IJERTCONV2IS13101.pdf
PDF
2 years ago
385.00 kB
Copy Link
image-matching-using-edge-and-corner-detection-IJERTCONV2IS13112.pdf
PDF
2 years ago
268.15 kB
Copy Link
pseudo-blob-classification-and-merging-techniques-for-cellular-segmentation-using-bayesian-epistemology-IJERTCONV2IS13102.pdf
PDF
2 years ago
900.04 kB
Copy Link
analysis-and-implementation-of-cholesky-decomposition-technique-based-pixel-level-colour-image-fusion-IJERTCONV2IS13121.pdf
PDF
2 years ago
374.38 kB
Copy Link
reputation-based-security-model-for-android-applications-IJERTCONV2IS13093.pdf
PDF
2 years ago
276.93 kB
Copy Link
secret-data-hiding-into-images-and-retrieval-from-images-using-qr-codes-IJERTCONV2IS13111.pdf
PDF
2 years ago
174.37 kB
Copy Link
swarm-intelligence-and-its-applications-IJERTCONV2IS13094.pdf
PDF
2 years ago
439.05 kB
Copy Link
hybrid-features-based-face-recognition-method-using-pca-and-svm-IJERTCONV2IS13110.pdf
PDF
2 years ago
1.11 MB
Copy Link
enhancing-visual-cryptographic-shares-using-rsa-algorithm-IJERTCONV2IS13095.pdf
PDF
2 years ago
395.08 kB
Copy Link
image-fusion-of-ultrasound-with-different-imaging-modalities-using-virtual-navigator-IJERTCONV2IS13109.pdf
PDF
2 years ago
415.83 kB
Copy Link
the-technique-to-detect-and-avoid-the-denial-of-service-attacks-in-wireless-sensor-networks-IJERTCONV2IS13083.pdf
PDF
2 years ago
197.49 kB
Copy Link
prediction-based-cfa-image-compression-and-demosaicking-using-lagrange-interpolation-IJERTCONV2IS13108.pdf
PDF
2 years ago
540.14 kB
Copy Link
simulation-of-load-balancing-algorithms-using-cloud-analyst-IJERTCONV2IS13084.pdf
PDF
2 years ago
230.70 kB
Copy Link
secure-transmission-of-digital-mammography-images-in-public-network-IJERTCONV2IS13107.pdf
PDF
2 years ago
237.15 kB
Copy Link
a-review-on-clinical-decision-support-system-and-its-scope-in-medical-field-IJERTCONV2IS13085.pdf
PDF
2 years ago
243.49 kB
Copy Link
rotation-invariant-point-set-matching-technique-in-clutter-scenes-IJERTCONV2IS13106.pdf
PDF
2 years ago
161.57 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.