2. Conference Papers : [2976] Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 961 to 980 of 2976
Issue DateTitleAuthor(s)Supervisor(s)
2013Nonlinear estimation and control of wind turbineSaravanakumar, R.; Jena, D.-
2011Non linear optical properties of banana shaped liquid crystalsNagappa; Mahadeva, J.; Somashekar, R.; Yalemaggad, C.V.; Umesh, G.; Manjunatha, K.B.-
2015Novel energy efficient virtual machine allocation at data center using Genetic algorithmSharma, N.K.; Ram Mohana Reddy, Guddeti-
2012Medical image retrieval system for diagnosis of brain tumor based on classification and content similarityArakeri, M.P.; Ram Mohana Reddy, Guddeti-
2012Node - Link disjoint multipath routing protocols for wireless sensor networks - A survey and conceptual modelingMuni, Venkateswarlu, K.; Chandra, Sekaran, K.; Kandasamy, A.-
2012Near field communication - Applications and performance studiesAkshay, Uttama, Nambi, S.N.; Prabhakar, T.V.; Jamadagni, H.S.; Ganapathi, K.; Pramod, B.K.; Rakesh, C.M.; Sanjay, Naik, R.-
2008NATR: A new algorithm for tracing routesPrasad, G.R.; Shet, K., C.; Bhat, Narasimha, B.-
2019Network anomaly detection using artificial neural networks optimised with PSO-DE hybridRithesh, K.; Gautham, A.V.; Chandra, Sekaran, K.-
2019Nitk Kids' speech corpusRamteke, P.B.; Supanekar, S.; Hegde, P.; Nelson, H.; Aithal, V.; Koolagudi, S.G.-
2015Neighbor embedding based super-resolution using residual luminanceMishra, D.; Majhi, B.; Sa, P.K.-
2017Negotiation and monitoring of service level agreements in cloud computing servicesAnithakumari, S.; Chandrasekaran, K.-
2019NEAT Algorithm for Testsuite generation in Automated Software TestingRaj, H.L.P.; Chandrasekaran, K.-
2013NN based ontology mappingManjula, Shenoy, K.; Shet, K.C.; Dinesh, Acharya, U.-
2018Near Optimal Solution for Traveling Salesman Problem using GPUYelmewad, P.; Talawar, B.-
2018Network Dominating Attack Detection and MitigationJohny, J.; Singh, M.P.-
2015New Data Hiding Technique in Encrypted Image: DKL Algorithm (Differing Key Length)Udhayavene, S.; Dev, A.T.; Chandrasekaran, K.-
2016Network optimization using femtocell deployment at macrocell edge in cognitive environmentGhosh, J.; Bachhar, S.; Nandi, U.K.; Rai, A.; Roy, S.D.-
2005National Water ConventionMadhyastha, M.N.-
2015NLP based intelligent news search engine using information extraction from e-newspapersKanakaraj, M.; Sowmya, Kamath S.-
2019Newtonian approach towards mathematical modelling and tuning of a continuously variable transmissionBharadwaj, P.B.; Jeyaraj, P.-
Collection's Items (Sorted by Submit Date in Descending order): 961 to 980 of 2976