×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
detection-of-web-spam-using-different-classification-algorithm-IJERTV3IS050977.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
detection-of-web-spam-using-different-classification-algorithm-IJERTV3IS050977.pdf
PDF
2 years ago
Get Size
Copy Link
effect-of-integrated-nutrient-management-on-productivity-and-soil-fertility-in-wheat-based-cropping-system-IJERTV3IS050966.pdf
PDF
2 years ago
Get Size
Copy Link
programmable-current-gain-cmos-amplifiers-IJERTV3IS050951.pdf
PDF
2 years ago
Get Size
Copy Link
efficient-ch-selection-method-for-pegasis-mh-protocol-in-wireless-sensor-network-for-lifetime-improvement-IJERTV3IS050871.pdf
PDF
2 years ago
457.04 kB
Copy Link
parameter-estimation-of-low-frequency-oscillations-using-prony-IJERTV3IS051456.pdf
PDF
2 years ago
Get Size
Copy Link
to-impart-lotus-effect-on-cotton-fabric-using-combination-of-silica-nanoparticles-water-repellent-agent-IJERTV3IS050802.pdf
PDF
2 years ago
358.61 kB
Copy Link
degradation-of-concrete-structures-and-protective-measures-IJERTV3IS050882.pdf
PDF
2 years ago
Get Size
Copy Link
novel-gpg-key-server-using-dns-based-authority-delegation-IJERTV3IS050767.pdf
PDF
2 years ago
393.36 kB
Copy Link
qos-mechanism-for-rtp-voice-and-rtp-video-based-on-queuing-techniques-IJERTV3IS051089.pdf
PDF
2 years ago
511.12 kB
Copy Link
a-robust-cluster-head-selection-method-based-on-k-medoids-algorithm-to-maximize-network-life-time-and-energy-efficiency-for-large-wsns-IJERTV3IS051191.pdf
PDF
2 years ago
Get Size
Copy Link
detecting-outliers-from-dataset-by-using-distributed-methods-IJERTV3IS050725.pdf
PDF
2 years ago
444.68 kB
Copy Link
real-time-filtering-malicious-packets-modeling-against-distributed-denial-of-service-attacks-IJERTV3IS051252.pdf
PDF
2 years ago
Get Size
Copy Link
study-of-various-attacks-and-impact-of-gray-hole-attack-over-ad-hoc-on-demand-aodv-routing-protocol-in-manets-IJERTV3IS050721.pdf
PDF
2 years ago
Get Size
Copy Link
iris-recognition-system-using-dct-a-survey-IJERTV3IS051293.pdf
PDF
2 years ago
Get Size
Copy Link
middleware-layer-for-replication-between-relational-and-document-databases-IJERTV3IS050707.pdf
PDF
2 years ago
419.14 kB
Copy Link
feature-extraction-for-signature-verification-using-hilditch-algorithm-IJERTV3IS051330.pdf
PDF
2 years ago
Get Size
Copy Link
automatic-detection-of-liver-lesions-using-hybrid-classification-techniques-IJERTV3IS051004.pdf
PDF
2 years ago
Get Size
Copy Link
characteristics-of-functionally-modified-foamed-concrete-by-nano-silica-IJERTV3IS051432.pdf
PDF
2 years ago
488.66 kB
Copy Link
vernam-cipher-encrypted-approach-for-classification-rule-hiding-to-preserve-the-privacy-in-database-IJERTV3IS050823.pdf
PDF
2 years ago
Get Size
Copy Link
morphological-image-processing-approach-of-vehicle-detection-for-real-time-traffic-analysis-IJERTV3IS051443.pdf
PDF
2 years ago
640.59 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.