Skip to main content
Publications
2014
Ragin Ramdas M., Santhosh Kumar K.S. RNCP
.
High and Low Transition Temperature Shape Memory Polymers from Polytriazole Networks; Tunable Shape Memory Properties and Repeatable High Shape Recovery
. In: PCYR14. ; 2014.
George GV, Thomas A
.
High Performance Vedic Multiplier Using Han-Carlson Adder
. International Journal of Engineering Research. 2014;3(3).
Panthalookaran V
.
Hone your fluent thinking skills
. Rajagiri Pallikkutam. 2014;1(8):19-21.
Sherly KK, Anntinu TJ
.
Hybrid 2-Factor Cryptosystem
. International conference on security and authentication. 2014.
Sherly KK, Nedunchezhian R
.
IAPI Quad-Filter: An Interactive and Adaptive Partitioned Approach for Incremental Frequent Pattern Mining
. Journal of Theoretical and Applied Information Technology. 2014;63(1):147-157.
John J, Madhu M
.
Implementation and Analysis of History Based Output Channel Selection Function for Adaptive Routers in Mesh NoCs,
. (accepted for publication) In ACM Transactions on Design Automation of Electronic Systems. 2014.
Anju Abraham AM
.
Implementation of a novel PFC Cuk rectifier fed brushless DC motor drive
. In: Annual International Conference on Emerging Research Areas: Magnetics, Machines and Drives (AICERA/iCMMD), 2014. Amal Jyothi College of Engineering, Kanjirappally: IEEE; 2014. p. 1-5.
Surendran EKL, Rony AP
.
IMPLEMENTATION OF FAST MULTIPLIER USING MODIFIED RADIX-4 BOOTH ALGORITHM WITH REDUNDANT BINARY ADDER
. International Conference on Computational Systems and Communications (ICCSC-2014). 2014:266-271.
PJ T
.
Implementation of High Step-up DC-DC Conversion Systems Using Cockcroft Walton Voltage Multiplie
Rajashekar A
. • National Conference on Cutting Edge Technologies in Power Conversion And Industrial Drives . 2014.
BindyaWilson, Koshy M, Thomas N, James D
.
An improved approach for secure image transmission
. In: National conference on new trends in electronics, computing and communication. ; 2014.
SEEMA S, S.K S
.
IMPROVED LOAD BALANCED SCALABLE CACHE ADAPTED VIDEO STREAMING BLOCKING SELFISHNESS
. ICTAGG '14. 2014;2(2):12-13.
Sangeetha J, Paul M
.
An Improved SRL based Plagiarism Detection Technique using Sentence Ranking
. In: ICICT. BOLGATTY PALACE & ISLAND RESORTS,KOCHI: Elsevier ; 2014.
Anjali PP, Andrews BP, Ganesh S, Daniel SE, Binu A
.
An impudent approach for prudential Hadoop cluster
. In: 2014 International Conference on Data Science & Engineering (ICDSE). IEEE; 2014. p. 28–31.
James. D
.
An innovative framework for the detection and prediction of phishing websites
. In: International Conference on Innovations & Advances In Science,Engineering And Technology. ; 2014.
an_innovative_framework_for_the_detection_and_prediction_of_phishing_websites.pdf
Unnikrishnan PC, Vijayakumar P
.
Intelligent Control using Adaptive PID Controller
. International Journal of Engineering Science and Technology. 2014;6(2):32-39.
P MT, Francis J
.
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering
. International Journal of Scientific & Engineering Research . 2014;5(11).
Abraham A
.
International Vulnerability Database Alliance as an Effective Vulnerability Disclosure Technique
. IJCSIT . 2014;5(2):1207-1209 .
ijcsit2014050256.pdf
Sherly KK, Anntinu TJ
.
JIT DYNAMIC CRYPTOSYSTEM
. International Journal of Research in Engineering and Technology. 2014;3(13):11-15.
Mary JA, Saritha S
.
Junction Based On-Demand Routing Protocol for VANETS
. International Journal of Engineering Research and Technology. 2014;3(10).
Krishna C
.
Learning Environment as a Service (LEaaS): Cloud
. In: Fourth International Conference on Advances in Computing and Communications . RSET: IEEE; 2014.
Pages
« first
‹ previous
…
33
34
35
36
37
38
39
40
41
…
next ›
last »