×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
swarm-intelligence-and-its-applications-IJERTCONV2IS13094.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
swarm-intelligence-and-its-applications-IJERTCONV2IS13094.pdf
PDF
2 years ago
439.05 kB
Copy Link
reputation-based-security-model-for-android-applications-IJERTCONV2IS13093.pdf
PDF
2 years ago
276.93 kB
Copy Link
enhancing-visual-cryptographic-shares-using-rsa-algorithm-IJERTCONV2IS13095.pdf
PDF
2 years ago
395.08 kB
Copy Link
pseudo-blob-classification-and-merging-techniques-for-cellular-segmentation-using-bayesian-epistemology-IJERTCONV2IS13102.pdf
PDF
2 years ago
900.04 kB
Copy Link
the-technique-to-detect-and-avoid-the-denial-of-service-attacks-in-wireless-sensor-networks-IJERTCONV2IS13083.pdf
PDF
2 years ago
197.49 kB
Copy Link
efficient-medical-image-watermarking-with-tamper-detection-and-recovery-IJERTCONV2IS13101.pdf
PDF
2 years ago
385.00 kB
Copy Link
simulation-of-load-balancing-algorithms-using-cloud-analyst-IJERTCONV2IS13084.pdf
PDF
2 years ago
230.70 kB
Copy Link
biometric-inspired-digital-image-steganography-IJERTCONV2IS13100.pdf
PDF
2 years ago
405.29 kB
Copy Link
a-review-on-clinical-decision-support-system-and-its-scope-in-medical-field-IJERTCONV2IS13085.pdf
PDF
2 years ago
243.49 kB
Copy Link
face-recognition-using-transform-domain-and-overlapping-lbp-techniques-IJERTCONV2IS13099.pdf
PDF
2 years ago
519.59 kB
Copy Link
simulation-of-distributed-intrusion-detection-based-on-ensemble-of-classifier-IJERTCONV2IS13086.pdf
PDF
2 years ago
273.64 kB
Copy Link
an-exploration-of-subspace-models-and-transformation-techniques-for-image-classification-IJERTCONV2IS13098.pdf
PDF
2 years ago
707.72 kB
Copy Link
network-capabilities-of-cloud-services-for-a-real-time-scientific-applicationcloudcast-IJERTCONV2IS13087.pdf
PDF
2 years ago
586.10 kB
Copy Link
sds-algorithm-for-image-sharing-IJERTCONV2IS13097.pdf
PDF
2 years ago
425.56 kB
Copy Link
cheating-prevention-in-visual-cryptography-IJERTCONV2IS13088.pdf
PDF
2 years ago
367.58 kB
Copy Link
image-matching-using-edge-and-corner-detection-IJERTCONV2IS13112.pdf
PDF
2 years ago
268.15 kB
Copy Link
wireless-sensor-networks-for-space-and-solar-system-missions-IJERTCONV2IS13089.pdf
PDF
2 years ago
657.92 kB
Copy Link
analysis-and-implementation-of-cholesky-decomposition-technique-based-pixel-level-colour-image-fusion-IJERTCONV2IS13121.pdf
PDF
2 years ago
374.38 kB
Copy Link
techniques-in-localization-IJERTCONV2IS13090.pdf
PDF
2 years ago
428.23 kB
Copy Link
secret-data-hiding-into-images-and-retrieval-from-images-using-qr-codes-IJERTCONV2IS13111.pdf
PDF
2 years ago
174.37 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.