Publications

2014
Ragin Ramdas M., Santhosh Kumar K.S. RNCP. High and Low Transition Temperature Shape Memory Polymers from Polytriazole Networks; Tunable Shape Memory Properties and Repeatable High Shape Recovery. In: PCYR14. ; 2014.
George GV, Thomas A. High Performance Vedic Multiplier Using Han-Carlson Adder. International Journal of Engineering Research. 2014;3(3).
Panthalookaran V. Hone your fluent thinking skills. Rajagiri Pallikkutam. 2014;1(8):19-21.
Sherly KK, Anntinu TJ. Hybrid 2-Factor Cryptosystem. International conference on security and authentication. 2014.
Sherly KK, Nedunchezhian R. IAPI Quad-Filter: An Interactive and Adaptive Partitioned Approach for Incremental Frequent Pattern Mining. Journal of Theoretical and Applied Information Technology. 2014;63(1):147-157.
John J, Madhu M. Implementation and Analysis of History Based Output Channel Selection Function for Adaptive Routers in Mesh NoCs, . (accepted for publication) In ACM Transactions on Design Automation of Electronic Systems. 2014.
Anju Abraham AM. Implementation of a novel PFC Cuk rectifier fed brushless DC motor drive. In: Annual International Conference on Emerging Research Areas: Magnetics, Machines and Drives (AICERA/iCMMD), 2014. Amal Jyothi College of Engineering, Kanjirappally: IEEE; 2014. p. 1-5.
Surendran EKL, Rony AP. IMPLEMENTATION OF FAST MULTIPLIER USING MODIFIED RADIX-4 BOOTH ALGORITHM WITH REDUNDANT BINARY ADDER. International Conference on Computational Systems and Communications (ICCSC-2014). 2014:266-271.
PJ T. Implementation of High Step-up DC-DC Conversion Systems Using Cockcroft Walton Voltage Multiplie Rajashekar A. • National Conference on Cutting Edge Technologies in Power Conversion And Industrial Drives . 2014.
BindyaWilson, Koshy M, Thomas N, James D. An improved approach for secure image transmission. In: National conference on new trends in electronics, computing and communication. ; 2014.
SEEMA S, S.K S. IMPROVED LOAD BALANCED SCALABLE CACHE ADAPTED VIDEO STREAMING BLOCKING SELFISHNESS. ICTAGG '14. 2014;2(2):12-13.
Sangeetha J, Paul M. An Improved SRL based Plagiarism Detection Technique using Sentence Ranking. In: ICICT. BOLGATTY PALACE & ISLAND RESORTS,KOCHI: Elsevier ; 2014.
Anjali PP, Andrews BP, Ganesh S, Daniel SE, Binu A. An impudent approach for prudential Hadoop cluster. In: 2014 International Conference on Data Science & Engineering (ICDSE). IEEE; 2014. p. 28–31.
James. D. An innovative framework for the detection and prediction of phishing websites. In: International Conference on Innovations & Advances In Science,Engineering And Technology. ; 2014. an_innovative_framework_for_the_detection_and_prediction_of_phishing_websites.pdf
Unnikrishnan PC, Vijayakumar P. Intelligent Control using Adaptive PID Controller. International Journal of Engineering Science and Technology. 2014;6(2):32-39.
P MT, Francis J. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering. International Journal of Scientific & Engineering Research . 2014;5(11).
Abraham A. International Vulnerability Database Alliance as an Effective Vulnerability Disclosure Technique. IJCSIT . 2014;5(2):1207-1209 . ijcsit2014050256.pdf
Sherly KK, Anntinu TJ. JIT DYNAMIC CRYPTOSYSTEM. International Journal of Research in Engineering and Technology. 2014;3(13):11-15.
Mary JA, Saritha S. Junction Based On-Demand Routing Protocol for VANETS. International Journal of Engineering Research and Technology. 2014;3(10).
Krishna C. Learning Environment as a Service (LEaaS): Cloud. In: Fourth International Conference on Advances in Computing and Communications . RSET: IEEE; 2014.

Pages