Collection's Items (Sorted by Submit Date in Descending order): 961 to 980 of 2976
Issue Date | Title | Author(s) | Supervisor(s) |
2013 | Nonlinear estimation and control of wind turbine | Saravanakumar, R.; Jena, D. | - |
2011 | Non linear optical properties of banana shaped liquid crystals | Nagappa; Mahadeva, J.; Somashekar, R.; Yalemaggad, C.V.; Umesh, G.; Manjunatha, K.B. | - |
2015 | Novel energy efficient virtual machine allocation at data center using Genetic algorithm | Sharma, N.K.; Ram Mohana Reddy, Guddeti | - |
2012 | Medical image retrieval system for diagnosis of brain tumor based on classification and content similarity | Arakeri, M.P.; Ram Mohana Reddy, Guddeti | - |
2012 | Node - Link disjoint multipath routing protocols for wireless sensor networks - A survey and conceptual modeling | Muni, Venkateswarlu, K.; Chandra, Sekaran, K.; Kandasamy, A. | - |
2012 | Near field communication - Applications and performance studies | Akshay, Uttama, Nambi, S.N.; Prabhakar, T.V.; Jamadagni, H.S.; Ganapathi, K.; Pramod, B.K.; Rakesh, C.M.; Sanjay, Naik, R. | - |
2008 | NATR: A new algorithm for tracing routes | Prasad, G.R.; Shet, K., C.; Bhat, Narasimha, B. | - |
2019 | Network anomaly detection using artificial neural networks optimised with PSO-DE hybrid | Rithesh, K.; Gautham, A.V.; Chandra, Sekaran, K. | - |
2019 | Nitk Kids' speech corpus | Ramteke, P.B.; Supanekar, S.; Hegde, P.; Nelson, H.; Aithal, V.; Koolagudi, S.G. | - |
2015 | Neighbor embedding based super-resolution using residual luminance | Mishra, D.; Majhi, B.; Sa, P.K. | - |
2017 | Negotiation and monitoring of service level agreements in cloud computing services | Anithakumari, S.; Chandrasekaran, K. | - |
2019 | NEAT Algorithm for Testsuite generation in Automated Software Testing | Raj, H.L.P.; Chandrasekaran, K. | - |
2013 | NN based ontology mapping | Manjula, Shenoy, K.; Shet, K.C.; Dinesh, Acharya, U. | - |
2018 | Near Optimal Solution for Traveling Salesman Problem using GPU | Yelmewad, P.; Talawar, B. | - |
2018 | Network Dominating Attack Detection and Mitigation | Johny, J.; Singh, M.P. | - |
2015 | New Data Hiding Technique in Encrypted Image: DKL Algorithm (Differing Key Length) | Udhayavene, S.; Dev, A.T.; Chandrasekaran, K. | - |
2016 | Network optimization using femtocell deployment at macrocell edge in cognitive environment | Ghosh, J.; Bachhar, S.; Nandi, U.K.; Rai, A.; Roy, S.D. | - |
2005 | National Water Convention | Madhyastha, M.N. | - |
2015 | NLP based intelligent news search engine using information extraction from e-newspapers | Kanakaraj, M.; Sowmya, Kamath S. | - |
2019 | Newtonian approach towards mathematical modelling and tuning of a continuously variable transmission | Bharadwaj, P.B.; Jeyaraj, P. | - |
Collection's Items (Sorted by Submit Date in Descending order): 961 to 980 of 2976