×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
efficient-implementation-of-acoustic-echo-cancellation-by-adaptive-neuro-fuzzy-inference-system-IJERTCONV2IS05039.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
efficient-implementation-of-acoustic-echo-cancellation-by-adaptive-neuro-fuzzy-inference-system-IJERTCONV2IS05039.pdf
PDF
2 years ago
422.24 kB
Copy Link
salt-and-pepper-noise-removal-in-digital-images-using-modified-decision-based-filter-IJERTCONV2IS05040.pdf
PDF
2 years ago
Get Size
Copy Link
a-3d-graphical-based-password-security-IJERTCONV2IS05038.pdf
PDF
2 years ago
159.13 kB
Copy Link
hybridization-of-abc-and-pso-for-optimal-rule-extraction-from-knowledge-discovery-database-IJERTCONV2IS05048.pdf
PDF
2 years ago
Get Size
Copy Link
double-guardsecuring-cloud-data-by-intrusion-detection-system-IJERTCONV2IS05041.pdf
PDF
2 years ago
Get Size
Copy Link
steadfast-aeronautical-communication-based-on-lbtm-mac-IJERTCONV1IS06104.pdf
PDF
2 years ago
Get Size
Copy Link
design-and-implementation-of-fir-filter-using-multi-bit-flip-flops-IJERTCONV2IS05044.pdf
PDF
2 years ago
376.09 kB
Copy Link
routing-mechanisms-to-reduce-delay-in-mobile-ad-hoc-networks-a-survey-IJERTCONV2IS05045.pdf
PDF
2 years ago
Get Size
Copy Link
integration-of-ins-gps-gsm-for-compact-and-low-power-application-with-increased-efficiency-IJERTCONV1IS06094.pdf
PDF
2 years ago
586.03 kB
Copy Link
concealment-of-data-storage-in-cloud-using-watermarking-IJERTCONV2IS05046.pdf
PDF
2 years ago
207.67 kB
Copy Link
vlsi-implementation-of-real-time-palmprint-recognition-system-IJERTCONV1IS06145.pdf
PDF
2 years ago
743.08 kB
Copy Link
investigation-on-efficacy-of-neural-network-in-signal-processing-IJERTCONV1IS06144.pdf
PDF
2 years ago
Get Size
Copy Link
depletion-of-node-battery-life-for-denial-of-service-in-wireless-adhoc-sensor-network-IJERTCONV2IS05047.pdf
PDF
2 years ago
Get Size
Copy Link
design-of-video-transform-engine-by-using-dct-techniques-IJERTCONV1IS06143.pdf
PDF
2 years ago
Get Size
Copy Link
anti-hacking-mechanism-for-keylogger-using-blackbox-detection-IJERTCONV2IS05029.pdf
PDF
2 years ago
Get Size
Copy Link
secure-packet-transfer-in-a-network-using-hierarchical-scheduler-with-crypto-algorithm-IJERTCONV2IS05030.pdf
PDF
2 years ago
Get Size
Copy Link
an-integrated-materialized-view-based-approach-in-etl-with-dss-to-achieve-fast-data-transformation-and-better-query-optimization-IJERTCONV1IS06142.pdf
PDF
2 years ago
244.96 kB
Copy Link
segmentation-of-fused-ct-and-mri-images-with-brain-tumor-IJERTCONV1IS06153.pdf
PDF
2 years ago
Get Size
Copy Link
energy-utilization-and-data-gathering-in-wireless-sensor-networks-using-mobile-sink-IJERTCONV2IS05031.pdf
PDF
2 years ago
Get Size
Copy Link
secret-data-hiding-based-on-zigzag-pixel-indicator-IJERTCONV2IS05032.pdf
PDF
2 years ago
278.03 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.