Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Issue Date
Author
Supervisor
Title
Subject
Help
Sign on to:
My DSpace
Receive email
updates
Edit Profile
IR@NITK
Browsing by Title
Jump to:
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
or enter first few letters:
Sort by:
title
issue date
submit date
In order:
Ascending
Descending
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Authors/Record:
All
1
5
10
15
20
25
30
35
40
45
50
Showing results 4977 to 4996 of 10090
< previous
next >
Issue Date
Title
Author(s)
Supervisor(s)
2008
InterTARM: FP-tree based framework for mining inter-transaction association rules from stock market data
Chhinkaniwala, H.
;
Santhi Thilagam, P.
-
2020
IntMA: Dynamic Interaction-aware resource allocation for containerized microservices in cloud environments
Joseph C.T.
;
Chandrasekaran K.
-
2018
Intonation tutor by SPIRE (In-SPIRE): An online tool for an automatic feedback to the second language learners in learning intonation
Anand, P.A.
;
Yarra, C.
;
Kausthubha, N.K.
;
Ghosh, P.K.
-
2020
Intra Prediction Strategies for Lossless Compression in High Efficiency Video Coding
S, Shilpa Kamath
P, Aparna.
2019
Intraday Stock Prediction Based on Deep Neural Network
Naik, N.
;
Mohan, B.R.
-
2020
Intrinsic evaluation for english�tamil bilingual word embeddings
Sanjanasri, J.P.
;
Menon, V.K.
;
Rajendran, S.
;
Soman, K.P.
;
Anand, Kumar, M.
-
1934
Introduction To Atomic Spectra
Harnwell, G P
-
2015
Introduction to Ceramics and Refractories
Surendranathan A.O.
-
1939
Introduction To Chemical Physics
Slater, J C
-
2007
Introduction to Mechatronics
Kutan, Appu K.K.
-
1938
Introduction To Principles Of Accounting
Finney, H A
-
1896
Introduction to Qualitative Analysis
Lash Miller, W
;
Smale, F J
-
1938
Introduction To The Theory Of Equations
Weisner, Louis
-
1939
An Introduction To The Theory Of Functions Of A Real variable
Verblunsky, S
-
2013
Intrusion detection as a service (IDaaS) in an open source cloud infrastructure
Veigas, J.P.
;
Sekaran, K.C.
-
2012
Intrusion detection technique for wormhole and following jellyfish and byzantine attacks in wireless mesh network
Reddy, K.G.
;
Santhi Thilagam, P.
-
2021
Invariance of kneading matrix under conjugacy
Gopalakrishna C.
;
Murugan, V.
-
2021
Inventory Management for Transmission Line Projects
Singh C.K.
;
Naik A.
;
Das B.B.
-
2018
Inverse approach for estimating boundary properties in a transient fin problem
Gnanasekaran, N.
;
Balaji, S.
-
2020
Inverse approach using bio-inspired algorithm within Bayesian framework for the estimation of heat transfer coefficients during solidification of casting
Vishweshwara P.S.
;
Gnanasekaran N.
;
Arun M.
-