×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
an-opa-based-highly-secure-steganography-scheme-using-hash-based-lsb-technique-and-huffman-coding-IJERTV2IS80516.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
an-opa-based-highly-secure-steganography-scheme-using-hash-based-lsb-technique-and-huffman-coding-IJERTV2IS80516.pdf
PDF
2 years ago
Get Size
Copy Link
a-non-linear-pid-fuzzy-approach-for-stabilization-of-inverted-pendulum-using-particle-swarm-optimisation-IJERTV2IS80073.pdf
PDF
2 years ago
385.13 kB
Copy Link
design-and-implementation-of-cmos-differential-vco-using-back-gate-transformer-feedback-IJERTV2IS80491.pdf
PDF
2 years ago
Get Size
Copy Link
micro-blaze-architecture-development-for-background-subtraction-algorithm-IJERTV2IS80471.pdf
PDF
2 years ago
Get Size
Copy Link
an-efficient-green-catalytic-process-for-degradation-of-organic-pollutants-in-industrial-waste-waters-IJERTV2IS80117.pdf
PDF
2 years ago
Get Size
Copy Link
fuzzy-rssi-based-localization-in-wireless-sensor-networks-IJERTV2IS80423.pdf
PDF
2 years ago
405.57 kB
Copy Link
structured-network-design-and-implementation-for-a-small-office-home-office-tutorialreport-IJERTV2IS80441.pdf
PDF
2 years ago
552.77 kB
Copy Link
fpga-implementation-of-quaternary-addersubtractorlogic-unit-IJERTV2IS60926.pdf
PDF
2 years ago
Get Size
Copy Link
combined-objective-optimization-of-fms-scheduling-with-non-traditional-optimization-techniques-IJERTV2IS80457.pdf
PDF
2 years ago
772.98 kB
Copy Link
characteristic-studies-on-aluminium-based-silicon-carbide-and-fly-ash-particulate-metal-matrix-composite-IJERTV2IS60928.pdf
PDF
2 years ago
273.83 kB
Copy Link
utilization-photovoltaic-plan-for-energy-conservation-and-decrease-co2-in-universiti-teknologi-malaysia-IJERTV2IS80432.pdf
PDF
2 years ago
265.99 kB
Copy Link
optimization-of-linear-antenna-array-using-firefly-algorithm-IJERTV2IS60960.pdf
PDF
2 years ago
642.79 kB
Copy Link
design-and-analysis-of-planner-inverted-f-antenna-pifa-for-gsm-3g-application-IJERTV2IS80428.pdf
PDF
2 years ago
Get Size
Copy Link
data-embedding-and-extracting-using-pixel-pair-matching-with-potential-masking-IJERTV2IS61012.pdf
PDF
2 years ago
488.04 kB
Copy Link
analysis-of-solving-polynomial-equations-using-homotopy-continuation-method-IJERTV2IS80394.pdf
PDF
2 years ago
311.82 kB
Copy Link
artificial-neural-network-prediction-of-maximum-scour-around-brige-piers-due-to-aquatic-weeds-racks-IJERTV2IS60245.pdf
PDF
2 years ago
911.78 kB
Copy Link
cbed-phase-and-symmetry-determination-of-a-new-member-of-homologous-series-ga2o3zno10-IJERTV2IS80345.pdf
PDF
2 years ago
512.49 kB
Copy Link
theoretical-analysis-of-coefficient-of-thermal-expansion-by-thermo-mechanical-analyzer-of-lm13mgo-composites-IJERTV2IS60851.pdf
PDF
2 years ago
637.69 kB
Copy Link
fpga-based-implementation-of-8-bit-alu-of-a-risc-processor-using-booth-algorithm-written-in-vhdl-language-IJERTV2IS80249.pdf
PDF
2 years ago
687.70 kB
Copy Link
use-of-kevlar-fabric-to-enhance-flexural-strength-of-rc-beams-IJERTV2IS60859.pdf
PDF
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.