×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
forgery-detection-by-biometric-images-using-svm-classifier-IJERTCONV6IS13080.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
forgery-detection-by-biometric-images-using-svm-classifier-IJERTCONV6IS13080.pdf
PDF
2 years ago
776.14 kB
Copy Link
mining-environment-monitoring-system-using-li-fi-IJERTCONV6IS13091.pdf
PDF
2 years ago
Get Size
Copy Link
power-flow-and-voltage-stability-improvement-using-upfc-IJERTCONV6IS13081.pdf
PDF
2 years ago
708.92 kB
Copy Link
3d-mapping-using-lidar-IJERTCONV6IS13090.pdf
PDF
2 years ago
464.65 kB
Copy Link
intelligent-information-sharing-system-for-vehicles-IJERTCONV6IS13082.pdf
PDF
2 years ago
439.60 kB
Copy Link
automatic-electrical-energy-tariff-management-billing-system-theft-monitoring-and-alarm-system-using-plc-and-scada-atmobs-IJERTCONV6IS13089.pdf
PDF
2 years ago
1.17 MB
Copy Link
low-cost-3d-printer-IJERTCONV6IS13083.pdf
PDF
2 years ago
Get Size
Copy Link
design-and-development-of-an-efficient-photovoltaic-system-with-maximum-power-point-tracking-technique-IJERTCONV6IS13085.pdf
PDF
2 years ago
463.58 kB
Copy Link
a-smart-and-sensitive-wheel-chair-for-physically-challenged-IJERTCONV6IS13073.pdf
PDF
2 years ago
588.95 kB
Copy Link
cloud-assisted-faster-video-streaming-and-sharing-IJERTCONV2IS11048.pdf
PDF
2 years ago
Get Size
Copy Link
enhanced-audio-steganography-using-triple-des-and-dwt-transformation-IJERTCONV6IS13072.pdf
PDF
2 years ago
557.85 kB
Copy Link
smart-water-flow-control-and-monitoring-system-IJERTCONV6IS13071.pdf
PDF
2 years ago
151.30 kB
Copy Link
provenance-control-based-secure-cloud-system-using-jar-accessibility-IJERTCONV2IS11038.pdf
PDF
2 years ago
Get Size
Copy Link
design-and-implementation-of-real-time-transformer-health-monitoring-system-using-raspberry-pi-IJERTCONV6IS13077.pdf
PDF
2 years ago
443.48 kB
Copy Link
dynamic-encryption-for-wireless-sensor-network-using-rc4-algorithm-IJERTCONV2IS11039.pdf
PDF
2 years ago
2.07 MB
Copy Link
enhanced-colour-image-security-and-data-hiding-using-ecc-encryption-and-dwt-svd-transforms-IJERTCONV6IS13076.pdf
PDF
2 years ago
925.30 kB
Copy Link
cloud-computing-study-on-cloud-computing-and-its-security-threats-IJERTCONV2IS11040.pdf
PDF
2 years ago
Get Size
Copy Link
performance-evaluation-of-tcpudp-and-its-variants-for-a-network-using-ns-2-IJERTCONV6IS13075.pdf
PDF
2 years ago
907.48 kB
Copy Link
an-artificial-neural-network-for-digital-mammography-image-analysis-IJERTCONV2IS11033.pdf
PDF
2 years ago
1.91 MB
Copy Link
iot-based-smart-garbage-monitoring-system-IJERTCONV6IS13087.pdf
PDF
2 years ago
320.68 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.