×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
encryption-of-text-characters-using-ascii-values-IJERTCONV2IS03032.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
encryption-of-text-characters-using-ascii-values-IJERTCONV2IS03032.pdf
PDF
2 years ago
53.50 kB
Copy Link
comparison-of-canny-edge-detector-with-sobel-and-prewitt-edge-detector-using-different-image-formats-IJERTCONV2IS03009.pdf
PDF
2 years ago
1.65 MB
Copy Link
rayleigh-bnard-taylor-convection-in-temperature-sensitive-newtonian-liquid-with-heat-sourcesink-IJERTV7IS070058.pdf
PDF
2 years ago
338.01 kB
Copy Link
advanced-applications-of-neural-networks-and-artificial-intelligence-a-review-IJERTCONV2IS03016.pdf
PDF
2 years ago
185.21 kB
Copy Link
on-products-of-polynomial-conjugate-epr-matrices-IJERTV2IS120951.pdf
PDF
2 years ago
387.03 kB
Copy Link
a-comparative-study-of-various-lossy-image-compression-techniques-IJERTCONV2IS03015.pdf
PDF
2 years ago
2.08 MB
Copy Link
effects-of-increasing-urbanization-on-river-basins-state-of-art-IJERTV2IS121108.pdf
PDF
2 years ago
234.82 kB
Copy Link
3-d-finite-element-analysis-of-bolted-joint-using-helical-thread-model-IJERTV2IS121119.pdf
PDF
2 years ago
605.43 kB
Copy Link
analytical-survey-of-image-steganography-algorithms-in-spatial-domain-IJERTCONV2IS03014.pdf
PDF
2 years ago
639.21 kB
Copy Link
pca-algorithm-and-its-application-in-image-compression-and-face-recognition-IJERTCONV2IS03013.pdf
PDF
2 years ago
116.79 kB
Copy Link
comparative-analysis-wi-fi-security-protocols-IJERTV2IS121127.pdf
PDF
2 years ago
251.66 kB
Copy Link
high-performance-computing-for-tomography-visualizations-IJERTCONV2IS03012.pdf
PDF
2 years ago
347.87 kB
Copy Link
a-systematic-study-of-test-adequacy-criteria-satisfied-by-uml-behavioural-models-IJERTV2IS121143.pdf
PDF
2 years ago
431.59 kB
Copy Link
image-encryption-for-secure-data-transfer-and-image-based-cryptography-IJERTCONV2IS03017.pdf
PDF
2 years ago
Get Size
Copy Link
dependable-and-secure-distributed-data-storage-in-cloud-computing-IJERTV2IS121154.pdf
PDF
2 years ago
328.22 kB
Copy Link
integrity-of-adhesive-bonded-joints-using-nde-of-ultrasonic-longitudinal-waves-part-1-d-mode-technique-IJERTV2IS121191.pdf
PDF
2 years ago
876.10 kB
Copy Link
comparative-study-of-various-concepts-of-handover-IJERTCONV2IS03025.pdf
PDF
2 years ago
59.91 kB
Copy Link
a-study-on-educational-progress-of-green-chemistry-IJERTCONV2IS03024.pdf
PDF
2 years ago
Get Size
Copy Link
steganalysis-with-location-based-features-and-efficiency-IJERTV2IS120979.pdf
PDF
2 years ago
Get Size
Copy Link
a-comparative-evaluation-of-leading-dense-stereo-vision-algorithms-using-opencv-IJERTCONV2IS03023.pdf
PDF
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.