Author Archives: IJERT

🌏
International Publishing Platform
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Design & Analysis of C shape Microstrip Antenna

View Abstract & full text pdf of Design & Analysis of C shape Microstrip Antenna

🌏
Global Research Authority
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

A Comprehensive Analysis Of The Vehicle Traffic Prediction

View Abstract & full text pdf of A Comprehensive Analysis Of The Vehicle Traffic Prediction

🌏
Global Research Platform
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

A Parallel Approach For High Utility Patterns Mining From Distributed Databases

View Abstract & full text pdf of A Parallel Approach For High Utility Patterns Mining From Distributed Databases

🔒
Peer-Reviewed Excellence Hub
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Securing And Preventing Aodv Routing Protocol From Black Hole Attack Using Counter Algorithm

View Abstract & full text pdf of Securing And Preventing Aodv Routing Protocol From Black Hole Attack Using Counter Algorithm

Global Research Platform
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Performance Analysis of 8-Bit ALU for Power in 32 Nm Scale

View Abstract & full text pdf of Performance Analysis of 8-Bit ALU for Power in 32 Nm Scale

International Engineering Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Enhancing Data Security in Cloud Computing Using 3D Framework & Digital Signature with Encryption

View Abstract & full text pdf of Enhancing Data Security in Cloud Computing Using 3D Framework & Digital Signature with Encryption

Quality Assured Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Layered Crf A Model To Build More Accurate Intrusion Detection System

View Abstract & full text pdf of Layered Crf A Model To Build More Accurate Intrusion Detection System

Authentic Engineering Platform
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Analysis Of Behaviour Of Security As A Service In Cloud For Smartphones

View Abstract & full text pdf of Analysis Of Behaviour Of Security As A Service In Cloud For Smartphones