×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
a-remote-attesation-for-enhanced-privacy-id-IJERTCONV1IS06128.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
a-remote-attesation-for-enhanced-privacy-id-IJERTCONV1IS06128.pdf
PDF
2 years ago
134.36 kB
Copy Link
a-novel-approach-for-detecting-and-monitoring-a-critical-event-in-wsn-using-sleep-scheduling-IJERTCONV1IS06127.pdf
PDF
2 years ago
295.38 kB
Copy Link
new-technology-input-device-by-eyes-and-nose-expressions-using-ensemble-method-IJERTCONV1IS06129.pdf
PDF
2 years ago
272.85 kB
Copy Link
spatial-data-retrieval-using-both-quality-and-distance-preference-using-top-k-algorithm-IJERTCONV1IS06130.pdf
PDF
2 years ago
301.77 kB
Copy Link
user-based-expert-discovery-system-with-improved-access-in-web-IJERTCONV1IS06126.pdf
PDF
2 years ago
Get Size
Copy Link
segmentation-of-multi-resolution-remote-sensing-images-using-pyramidal-watershed-transform-IJERTCONV1IS06131.pdf
PDF
2 years ago
715.06 kB
Copy Link
anonymization-of-high-dimensional-data-by-dimensionality-reduction-using-feature-selection-IJERTCONV1IS06140.pdf
PDF
2 years ago
335.99 kB
Copy Link
1t-dram-memory-cell-design-and-analysis-in-cntfet-technology-IJERTCONV1IS06122.pdf
PDF
2 years ago
615.83 kB
Copy Link
privacy-preserving-data-publishing-using-slicing-with-marginal-publication-IJERTCONV1IS06139.pdf
PDF
2 years ago
516.12 kB
Copy Link
role-of-artificial-intelligence-and-data-mining-techniques-in-defence-forces-using-global-positioning-v-IJERTCONV1IS06138.pdf
PDF
2 years ago
263.27 kB
Copy Link
dycsr-dynamic-composition-of-soap-services-and-restful-services-in-e-governance-applications-IJERTCONV1IS06123.pdf
PDF
2 years ago
254.05 kB
Copy Link
quantitative-evaluation-of-ao-based-soa-application-for-university-automation-using-an-experimental-testbed-IJERTCONV1IS06120.pdf
PDF
2 years ago
606.30 kB
Copy Link
reconfigurable-controller-design-for-continuous-stirred-tank-reactor-IJERTCONV1IS06137.pdf
PDF
2 years ago
321.43 kB
Copy Link
security-for-soap-based-communication-among-web-services-IJERTCONV1IS06121.pdf
PDF
2 years ago
436.81 kB
Copy Link
recommendation-of-desired-learning-path-to-provide-optimized-concept-access-IJERTCONV1IS06136.pdf
PDF
2 years ago
433.12 kB
Copy Link
mutiple-query-search-in-a-classical-database-using-quantum-algorithm-IJERTCONV1IS06115.pdf
PDF
2 years ago
521.45 kB
Copy Link
recommendation-on-bundling-the-items-using-item-basedcollaborative-filtering-technique-IJERTCONV1IS06135.pdf
PDF
2 years ago
209.10 kB
Copy Link
a-preprocessing-semantic-filtering-mechanism-for-improving-the-discovery-of-owl-s-services-IJERTCONV1IS06116.pdf
PDF
2 years ago
401.28 kB
Copy Link
fpga-implementation-of-rsepd-technique-based-impulse-noise-removal-IJERTCONV1IS06134.pdf
PDF
2 years ago
1.20 MB
Copy Link
speed-enhancement-and-leakage-reduction-in-advanced-wdr-image-sensors-IJERTCONV1IS06149.pdf
PDF
2 years ago
592.31 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.