×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
implementing-software-defined-networking-sdn-in-a-campus-environment-IJERTCONV3IS18016.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
implementing-software-defined-networking-sdn-in-a-campus-environment-IJERTCONV3IS18016.pdf
PDF
2 years ago
367.48 kB
Copy Link
mess-management-system-implementation-IJERTCONV3IS24003.pdf
PDF
2 years ago
Get Size
Copy Link
mobile-relay-configuration-in-data-intensive-wireless-sensor-networks-IJERTCONV3IS24012.pdf
PDF
2 years ago
296.93 kB
Copy Link
two-way-mobile-authentication-system-IJERTCONV3IS24002.pdf
PDF
2 years ago
Get Size
Copy Link
clustering-based-on-user-movement-similarity-measures-IJERTCONV3IS18010.pdf
PDF
2 years ago
599.63 kB
Copy Link
detection-of-malicious-activity-at-autonomous-system-and-their-internet-connectivity-IJERTCONV3IS18009.pdf
PDF
2 years ago
234.99 kB
Copy Link
privacy-preserving-and-access-control-mechanism-for-health-database-IJERTCONV3IS12013.pdf
PDF
2 years ago
198.47 kB
Copy Link
detection-of-eye-blink-and-redness-by-smart-eye-protector-application-IJERTCONV3IS12012.pdf
PDF
2 years ago
Get Size
Copy Link
a-study-of-extracttransform-load-etl-processes-IJERTCONV3IS18007.pdf
PDF
2 years ago
344.18 kB
Copy Link
extended-r-tree-indexing-structure-for-ensemble-stream-data-classification-IJERTCONV3IS18008.pdf
PDF
2 years ago
472.97 kB
Copy Link
multivariate-correlation-analysis-technique-for-dos-attack-detection-IJERTCONV3IS12011.pdf
PDF
2 years ago
198.77 kB
Copy Link
big-data-challenges-and-security-issues-IJERTCONV3IS12010.pdf
PDF
2 years ago
Get Size
Copy Link
a-web-mining-process-for-knowledge-discovery-of-web-usage-patterns-IJERTCONV3IS18015.pdf
PDF
2 years ago
433.09 kB
Copy Link
3-d-face-recognition-with-facial-expressions-IJERTCONV3IS18022.pdf
PDF
2 years ago
597.92 kB
Copy Link
enhanced-packet-delivery-techniques-using-packet-hiding-schemes-on-jamming-attacks-IJERTCONV3IS12009.pdf
PDF
2 years ago
326.58 kB
Copy Link
limtm-a-framework-for-assimilating-link-based-importance-in-to-semantically-coherent-clusters-of-correlated-words-IJERTCONV3IS12008.pdf
PDF
2 years ago
Get Size
Copy Link
significant-capable-information-retrieve-control-for-multi-ability-cloud-storage-space-IJERTCONV3IS18021.pdf
PDF
2 years ago
151.16 kB
Copy Link
attack-me-if-you-can-resisting-proxy-based-mimicking-attack-IJERTCONV3IS12007.pdf
PDF
2 years ago
Get Size
Copy Link
replica-management-and-high-availability-in-hadoop-distributed-file-system-hdfs-IJERTCONV3IS18020.pdf
PDF
2 years ago
525.74 kB
Copy Link
object-recognition-using-adaptive-threshold-based-drlbp-for-feature-extraction-IJERTCONV3IS12022.pdf
PDF
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.