×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
ehrp-evolutionary-hybrid-routing-algorithm-for-wireless-sensor-network-IJERTV3IS051041.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
ehrp-evolutionary-hybrid-routing-algorithm-for-wireless-sensor-network-IJERTV3IS051041.pdf
PDF
2 years ago
Get Size
Copy Link
numerical-study-on-seismic-and-temperature-effects-in-a-rcc-building-IJERTV3IS051055.pdf
PDF
2 years ago
Get Size
Copy Link
study-on-the-properties-of-pervious-concrete-IJERTV3IS051032.pdf
PDF
2 years ago
Get Size
Copy Link
waste-heat-recovery-in-cement-plant-IJERTV3IS051014.pdf
PDF
2 years ago
Get Size
Copy Link
optimising-block-matching-algorithms-by-redundancy-removal-for-fast-motion-estimation-IJERTV3IS051098.pdf
PDF
2 years ago
366.80 kB
Copy Link
a-novel-methodology-for-secure-multi-owner-data-sharing-for-dynamic-group-in-cloud-IJERTV3IS050764.pdf
PDF
2 years ago
568.90 kB
Copy Link
kinematic-and-dynamic-analysis-of-a-robot-arm-used-for-all-terrain-robot-IJERTV3IS051137.pdf
PDF
2 years ago
Get Size
Copy Link
design-and-implementation-of-stream-cipher-key-exchange-in-fpga-IJERTV3IS050995.pdf
PDF
2 years ago
487.51 kB
Copy Link
analysis-of-sybil-attack-in-wireless-sensor-networks-IJERTV3IS051132.pdf
PDF
2 years ago
Get Size
Copy Link
secure-and-efficient-data-transmission-using-ldpc-and-aes-method-in-digital-signal-processor-and-vlsi-IJERTV3IS051107.pdf
PDF
2 years ago
331.03 kB
Copy Link
vernam-cipher-encrypted-approach-for-classification-rule-hiding-to-preserve-the-privacy-in-database-IJERTV3IS050823.pdf
PDF
2 years ago
Get Size
Copy Link
automatic-detection-of-liver-lesions-using-hybrid-classification-techniques-IJERTV3IS051004.pdf
PDF
2 years ago
Get Size
Copy Link
stress-optimization-of-frame-with-reinforcement-technique-by-fea-IJERTV3IS051101.pdf
PDF
2 years ago
Get Size
Copy Link
middleware-layer-for-replication-between-relational-and-document-databases-IJERTV3IS050707.pdf
PDF
2 years ago
419.14 kB
Copy Link
efficient-mechanism-for-congestion-control-and-bandwidth-utilization-of-vanet-IJERTV3IS050698.pdf
PDF
2 years ago
Get Size
Copy Link
study-of-various-attacks-and-impact-of-gray-hole-attack-over-ad-hoc-on-demand-aodv-routing-protocol-in-manets-IJERTV3IS050721.pdf
PDF
2 years ago
Get Size
Copy Link
communication-interface-for-mute-and-hearing-impaired-people-IJERTV3IS050601.pdf
PDF
2 years ago
Get Size
Copy Link
detecting-outliers-from-dataset-by-using-distributed-methods-IJERTV3IS050725.pdf
PDF
2 years ago
444.68 kB
Copy Link
a-simplified-data-security-aspect-in-cloud-computing-modified-rsa-implementation-IJERTV3IS050591.pdf
PDF
2 years ago
451.95 kB
Copy Link
novel-gpg-key-server-using-dns-based-authority-delegation-IJERTV3IS050767.pdf
PDF
2 years ago
393.36 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.