×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
a-comparative-study-of-different-ad-hoc-routing-protocols-based-on-qualitative-parameters-IJERTV2IS3647.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
a-comparative-study-of-different-ad-hoc-routing-protocols-based-on-qualitative-parameters-IJERTV2IS3647.pdf
PDF
2 years ago
Get Size
Copy Link
photovoltaic-cell-with-concentrating-collector-a-review-IJERTV2IS3456.pdf
PDF
2 years ago
236.33 kB
Copy Link
glaucomatous-image-classification-using-wavelet-based-energy-signatures-and-neural-networks-IJERTV2IS3507.pdf
PDF
2 years ago
Get Size
Copy Link
illumination-and-pose-variation-across-face-recognition-using-local-mapping-analysis-IJERTV2IS3535.pdf
PDF
2 years ago
Get Size
Copy Link
frequent-pattern-mining-algorithm-based-on-single-scanning-of-whole-transactional-dataset-IJERTV2IS3610.pdf
PDF
2 years ago
Get Size
Copy Link
distribution-of-ions-electrons-and-dust-particles-in-partially-ionized-and-magnetized-molecular-clouds-IJERTV2IS3509.pdf
PDF
2 years ago
539.43 kB
Copy Link
a-survey-on-quadrant-routing-protocol-for-receiver-based-dynamic-multicast-adhoc-networks-IJERTV2IS3254.pdf
PDF
2 years ago
Get Size
Copy Link
optimization-of-memory-built-in-self-test-and-repairability-by-using-march-ss-algorithm-for-srams-IJERTV2IS3283.pdf
PDF
2 years ago
496.00 kB
Copy Link
wireless-sensor-networks-wsns-in-industrial-automation-case-study-of-nigeria-oil-and-gas-industry-IJERTV2IS3570.pdf
PDF
2 years ago
Get Size
Copy Link
an-integrated-cryptography-approach-using-msa-symmetric-key-IJERTV2IS3668.pdf
PDF
2 years ago
243.69 kB
Copy Link
failure-analysis-of-exhaust-valve-spring-of-c.i.engine-IJERTV2IS3475.pdf
PDF
2 years ago
Get Size
Copy Link
blind-image-quality-assessment-for-highly-distorted-images-using-ciqe-algorithm-IJERTV2IS3474.pdf
PDF
2 years ago
295.64 kB
Copy Link
image-encryption-using-random-scrambling-and-xor-operation-IJERTV2IS3297.pdf
PDF
2 years ago
522.63 kB
Copy Link
dawn-of-a-new-concept-of-communication-broadband-technology-a-review-IJERTV2IS3250.pdf
PDF
2 years ago
Get Size
Copy Link
wad-hla-wormhole-attack-detection-using-hop-latency-and-adjoining-node-analysis-in-manet-IJERTV2IS3284.pdf
PDF
2 years ago
Get Size
Copy Link
optimizing-streaming-of-web-based-advertisements-with-personalized-interest-and-content-based-mapping-IJERTV2IS3128.pdf
PDF
2 years ago
Get Size
Copy Link
new-approach-to-authentication-and-data-repairing-for-document-image-IJERTV2IS3182.pdf
PDF
2 years ago
Get Size
Copy Link
a-comparative-study-of-advanced-reservation-algorithms-in-optical-grid-IJERTV2IS3431.pdf
PDF
2 years ago
Get Size
Copy Link
effect-of-the-repair-parameter-on-the-lifetime-of-bonded-composite-repair-in-aircraft-structure-IJERTV2IS3049.pdf
PDF
2 years ago
Get Size
Copy Link
fpga-implementation-of-alu-using-bist-IJERTV2IS3222.pdf
PDF
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.