×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
efficient-ch-selection-method-for-pegasis-mh-protocol-in-wireless-sensor-network-for-lifetime-improvement-IJERTV3IS050871.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
efficient-ch-selection-method-for-pegasis-mh-protocol-in-wireless-sensor-network-for-lifetime-improvement-IJERTV3IS050871.pdf
PDF
2 years ago
457.04 kB
Copy Link
to-impart-lotus-effect-on-cotton-fabric-using-combination-of-silica-nanoparticles-water-repellent-agent-IJERTV3IS050802.pdf
PDF
2 years ago
358.61 kB
Copy Link
programmable-current-gain-cmos-amplifiers-IJERTV3IS050951.pdf
PDF
2 years ago
Get Size
Copy Link
novel-gpg-key-server-using-dns-based-authority-delegation-IJERTV3IS050767.pdf
PDF
2 years ago
393.36 kB
Copy Link
detection-of-web-spam-using-different-classification-algorithm-IJERTV3IS050977.pdf
PDF
2 years ago
Get Size
Copy Link
effect-of-integrated-nutrient-management-on-productivity-and-soil-fertility-in-wheat-based-cropping-system-IJERTV3IS050966.pdf
PDF
2 years ago
Get Size
Copy Link
detecting-outliers-from-dataset-by-using-distributed-methods-IJERTV3IS050725.pdf
PDF
2 years ago
444.68 kB
Copy Link
parameter-estimation-of-low-frequency-oscillations-using-prony-IJERTV3IS051456.pdf
PDF
2 years ago
Get Size
Copy Link
study-of-various-attacks-and-impact-of-gray-hole-attack-over-ad-hoc-on-demand-aodv-routing-protocol-in-manets-IJERTV3IS050721.pdf
PDF
2 years ago
Get Size
Copy Link
degradation-of-concrete-structures-and-protective-measures-IJERTV3IS050882.pdf
PDF
2 years ago
Get Size
Copy Link
middleware-layer-for-replication-between-relational-and-document-databases-IJERTV3IS050707.pdf
PDF
2 years ago
419.14 kB
Copy Link
qos-mechanism-for-rtp-voice-and-rtp-video-based-on-queuing-techniques-IJERTV3IS051089.pdf
PDF
2 years ago
511.12 kB
Copy Link
automatic-detection-of-liver-lesions-using-hybrid-classification-techniques-IJERTV3IS051004.pdf
PDF
2 years ago
Get Size
Copy Link
a-robust-cluster-head-selection-method-based-on-k-medoids-algorithm-to-maximize-network-life-time-and-energy-efficiency-for-large-wsns-IJERTV3IS051191.pdf
PDF
2 years ago
Get Size
Copy Link
vernam-cipher-encrypted-approach-for-classification-rule-hiding-to-preserve-the-privacy-in-database-IJERTV3IS050823.pdf
PDF
2 years ago
Get Size
Copy Link
real-time-filtering-malicious-packets-modeling-against-distributed-denial-of-service-attacks-IJERTV3IS051252.pdf
PDF
2 years ago
Get Size
Copy Link
design-and-implementation-of-stream-cipher-key-exchange-in-fpga-IJERTV3IS050995.pdf
PDF
2 years ago
487.51 kB
Copy Link
iris-recognition-system-using-dct-a-survey-IJERTV3IS051293.pdf
PDF
2 years ago
Get Size
Copy Link
a-novel-methodology-for-secure-multi-owner-data-sharing-for-dynamic-group-in-cloud-IJERTV3IS050764.pdf
PDF
2 years ago
568.90 kB
Copy Link
feature-extraction-for-signature-verification-using-hilditch-algorithm-IJERTV3IS051330.pdf
PDF
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.