×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
a-tool-for-detection-of-software-vulnerabilities-in-java-programs-IJERTCONV2IS11031.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
a-tool-for-detection-of-software-vulnerabilities-in-java-programs-IJERTCONV2IS11031.pdf
PDF
2 years ago
2.03 MB
Copy Link
design-of-biometric-based-transaction-system-using-open-source-software-development-environinent-IJERTCONV2IS11030.pdf
PDF
2 years ago
Get Size
Copy Link
analysis-of-performance-in-competitive-examinations-pattern-analysis-using-statistical-and-data-mining-techniques-a-case-study-IJERTCONV2IS11032.pdf
PDF
2 years ago
2.46 MB
Copy Link
a-consumer-centric-internet-based-e-retailing-business-mode-in-b2c-market-the-relation-between-consumer-and-shopping-website-IJERTCONV2IS11029.pdf
PDF
2 years ago
Get Size
Copy Link
caching-for-faster-duplicate-and-irrelevant-record-detection-using-a-non-relational-database-md5-checksum-a-case-study-IJERTCONV2IS11020.pdf
PDF
2 years ago
3.46 MB
Copy Link
comparative-analysis-of-software-estimation-models-IJERTCONV2IS11028.pdf
PDF
2 years ago
Get Size
Copy Link
srgm-tool-with-two-dimension-impelled-debugging-IJERTCONV2IS11021.pdf
PDF
2 years ago
1.65 MB
Copy Link
improving-the-selection-of-features-through-fuzzy-gineans-clustering-technique-IJERTCONV2IS11027.pdf
PDF
2 years ago
3.82 MB
Copy Link
design-and-development-of-adjustable-stair-climbing-robot-and-remote-controlled-vehicle-IJERTCONV2IS11022.pdf
PDF
2 years ago
2.85 MB
Copy Link
minimizing-query-delay-in-load-balanced-manets-through-data-replication-IJERTCONV2IS11009.pdf
PDF
2 years ago
2.93 MB
Copy Link
the-design-of-an-unmanned-aerial-vehicle-IJERTCONV2IS11023.pdf
PDF
2 years ago
1.35 MB
Copy Link
software-engineering-and-case-IJERTCONV2IS11008.pdf
PDF
2 years ago
3.96 MB
Copy Link
study-of-current-network-intrusion-detection-techniques-and-future-trends-IJERTCONV2IS11024.pdf
PDF
2 years ago
1.29 MB
Copy Link
improving-network-lifetime-through-muliple-mobile-sinks-in-wsn-IJERTCONV2IS11007.pdf
PDF
2 years ago
2.20 MB
Copy Link
maneta-re-volution-in-networks-IJERTCONV2IS11025.pdf
PDF
2 years ago
2.32 MB
Copy Link
enhanced-network-coding-based-privacy-preservation-against-traffic-analysis-in-multi-hop-wireless-networks-IJERTCONV2IS11006.pdf
PDF
2 years ago
2.47 MB
Copy Link
performance-aware-cirtualization-io-workload-IJERTCONV2IS11018.pdf
PDF
2 years ago
2.28 MB
Copy Link
development-of-supplier-selection-using-game-theoretical-approach-IJERTCONV2IS11005.pdf
PDF
2 years ago
1.43 MB
Copy Link
the-macroscopic-analysis-of-peepal-leaf-by-using-the-techniques-of-image-processing-IJERTCONV2IS11019.pdf
PDF
2 years ago
3.05 MB
Copy Link
an-efficient-method-for-preserving-privacy-of-classification-data-used-for-decision-tree-learning-IJERTCONV2IS11004.pdf
PDF
2 years ago
3.65 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.