Skip to main content
Publications
2011
Sherly KK, Justy J
.
SQL Injection Disclosure using BLAH Algorithm
. International conference on Advances in Computing and Communications in computer and information sciences. 2011;191:693–702 .
Sebastian MP, K SK, G. SK
.
Suffix Separation in Statistical Machine Translation from English to Malayalam using Sandhi Rules
. National Conference on Indian Language Computing. 2011.
Shobana JS, Paramasivan B, Prakash VM
.
A Survey on Congestion Control in Wireless Sensor Networks (WSN)
. CiiT International Journal of Wireless Communications. 2011;3(5):363–370.
Naveen N
.
Tamper Detection and Authentication in JPEG 2000 Images Using Chaotic Watermarking Scheme
. In: IEEE International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011). ; 2011.
George R, S. S
.
Terminal Sliding Mode Control for Spacecraft Formation Flying and Comparison with Sliding Mode Control
. In: National Level Conference on Recent Trends in energy Management and Control 2011. Vazhakulam: Viswajyothi College of Engineering and Technology, Vazhakulam; 2011.
Jaseena K
.
Text Watermarking using Combined Image and Text for Authentication and Protection
Anita J
. International Journal of Computer Applications(IJCA). 2011;20(4):8-13.
P.B R
.
‘Theoretical Formulation for Detecting Diseases using Mathematical Morphology and Fractal Geometry’
. International Journal of Information Science and Computer MathematicsISSN: 1829 – 4969,. 2011;Volume 3(No.2):79-89.
Binu A, Kumar SG
.
Virtualization techniques: a methodical review of XEN and KVM
. In: International Conference on Advances in Computing and Communications. Springer, Berlin, Heidelberg; 2011. p. 399–410.
S CK
.
WEB SERVICE BASED E-LOGISTICS APPLICATION
. In: International conference on web service computing (ICSWC 2011). ; 2011.
Prakash VM, Shobana JS, Infant AP
.
Wipe Out Brute Force and Malware Based Victim Attacks Using One-Time Password and Grid-Clear-CAPTCHA (GCC) – Analytical Study
. CiiT International Journal of Networking and Communication Engineering. 2011;3(3):177–182.
2010
Sam CA, C.K. V
.
An Advanced method for Energy Regeneration in Electric Vehicles
. ECM 2010. 2010.
Sebastian MP, Sheena KK, Santhosh KG
.
Alignment Model and Training Technique in SMT from English to Malayalam
. of Third International Conference, Contemporary ComputingCommunications in Computer and Information Science. 2010;Volume 94:pp 305-315 .
noida.pdf
Thankachan PT, Madhu DG, Bhasi DM
.
Application of Concurrent Engineering in a Manufacturing Industry
. International Journal of Computer Integrated Manufacturing. 2010;23(5):425–440.
K.K S
.
An Application Oriented Psycho motor Approach on BOAT Decision Tree Classifier in Data Mining
. International Seminar on Innovative in Pedagogical Approaches . 2010.
Sherly KK, Nedunchezhian R
.
Boat Adaptive Credit Card Fraud Detection System
. IEEE International Conference on Computational Intelligence and Computing Research, ICCIC-2010. 2010:1-7.
Panthalookaran V
.
CFD-assisted optimization of chimney-like flows to cool an electronic gadget
. Journal of Electronic Packaging . 2010;132(3).
JOHN JOMINA
.
CHAOTIC CRYPTOGRAPHY
. In: NATIONAL CONFERENCE ON NEXT GENERATION COMPUTER PARADIMS. ; 2010.
Sebastian MP, K SK, G. SK
.
A Classification of Sandhi Rules for Suffix Separation in Malayalam.
38th All India Conference of Dravidian Linguists. 2010.
tvm.pdf
Varghese C
.
Cloud Computing Interoperability for Virtual Machine Mobility
. National conference on Advanced Computing Interoperability for Virtual Machine Mobility . 2010.
Krishna DD, Gopikrishna M, Aanandan CK
.
A compact printed inverted cone antenna for UWB based applications
. In: IEEE; 2010. p. 420 - 423.
Pages
« first
‹ previous
…
57
58
59
60
61
62
63
64
65
…
next ›
last »