×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of iserp-iserp
A Procedure for Quantification and Optimization of Stabilized Subgrade Pavement Materials
216 views
10.IJAEST-Vol-No-6-Issue-No-1-Information-Systems-Strategic-Planning-At-the-Siliwangi-University-Tas
220 views
Implementation and Characteristics of Induction Generator fed Three Level ZSI for Wind Energy
214 views
2.IJAEST-Vol-No-7-Issue-No-1-Investigations-on-SCM-CATV-Transmission-link-with-and-without-Fiber-Bra
214 views
Combustion Synthesis and Photoluminescence Characteristics of Akermanite: A Novel Biomaterial
226 views
4-IJEAST-Vol-No.4-Issue-No-1-Performance-Measures-in-Education-and-Productive-Efficiency-022-025
213 views
Malware Analysis Using Assembly Level Program
220 views
14.IJAEST-Vol-No-7-Issue-No-1-Optimization-of-Feedforward-Neural-Network-for-Audio-Classification-Sy
212 views
9-IJAEST-Volume-No-3-Issue-No-1-Communication-Blackout-Causes-and-Measures-046-049
214 views
3.IJAEST-Vol-No-6-Issue-No-1-A-Novel-Approach-for-Indian-License-Plate-Recognition-System-010-014
215 views
6-IJAEBM-Volume-No-1-Issue-No-1-ECONOMICS-OF-TRACEABILITY-FOR-EASING-OF-FOOD-RECALL-COSTS-039-051
214 views
15-IJAEST-Volume-No-2-Issue-No-1-Related-Fixed-Points-Theorems-on-Three-Metric-Spaces-(FPTTMS)-104-1
213 views
13.IJAEST-Vol-No-6-Issue-No-2-A-Routing-Driven-Public-key-Crypto-system-based-key-management-scheme-
213 views
4.IJAEST-Vol-No-7-Issue-No-2-A-New-Approach-To-Image-Contrast-Enhancement-using-Weighted-Threshold-H
214 views
4-IJAEST-Volume-No-3-Issue-No-2-The-Applications-of-Weibull-Function-to-Partial-Discharge-Analysis-a
218 views
1-IJAEST-Volume-No-3-Issue-No-2-A-Survey-of-Communication-and-Sensing-for-Energy-Management-of-Appli
212 views
2-IJAEST-Volume-No-3-Issue-No-2-Aerodynamic-Multi-Objective-Optimization-Using-Parallel-Genetic-Algo
215 views
23.IJAEST-Vol-No-6-Issue-No-1-Low-Power-ASIC-Design-For-Automation-In-Various-Industrial-Application
213 views
8.IJAEST-Vol-No-6-Issue-No-1-Adaptive-Beam-Forming-using-DMI-and-CMA-Algorithms-035-040
214 views
6-IJAEST-Volume-No-3-Issue-No-1-MULTI-LAYERS-SECURITY-SCHEME-FOR-EMBEDDING-SECRETS-IN-STEGO-IMAGE-(M
213 views
Next >