Showing 1 - 5 results of 5 for search 'R. Venkatesan' Skip to content
    • About the Library
    • Rules and Regulations
    • Library Services
    • Library Hours
  • Library News
    • Digital Repository
    • Google Scholar
    • ResearchGate
    • AJoGPL
    • KURJ
    • AJLS
    • MyLOFT
    • Lexis Plus UK
    • Britannica Academic
    • Research Support Tools
    • Quick Resource Links
  • Login
Advanced
  • Author
  • R. Venkatesan
Showing 1 - 5 results of 5 for search 'R. Venkatesan', query time: 0.01s Refine Results
  1. 1
    Cluster-Based Architecture for Range-Free Localization in Wireless Sensor Networks

    Cluster-Based Architecture for Range-Free Localization in Wireless Sensor Networks by S. V. Manisekaran, R. Venkatesan

    Published 2014-04-01
    Get full text
    Article
    Save to List
    Saved in:
  2. 2
    Cost-Sensitive Radial Basis Function Neural Network Classifier for Software Defect Prediction

    Cost-Sensitive Radial Basis Function Neural Network Classifier for Software Defect Prediction by P. Kumudha, R. Venkatesan

    Published 2016-01-01
    Get full text
    Article
    Save to List
    Saved in:
  3. 3
    Optimizing humidifier performance by modifying packing material location and thickness

    Optimizing humidifier performance by modifying packing material location and thickness by K. Srithar, R. Venkatesan, M. Rishidev, R. Saravanan

    Published 2024-01-01
    Get full text
    Article
    Save to List
    Saved in:
  4. 4
    Study on Acoustic Variability Affected by Upper Ocean Dynamics in South Eastern Arabian Sea

    Study on Acoustic Variability Affected by Upper Ocean Dynamics in South Eastern Arabian Sea by Kotta Srinivasu, M. C. Sanjana, G. Latha, T. V. S. Udaya Bhaskar, Hasibur Rahaman, A. Thirunavukkarasu, R Venkatesan

    Published 2024-11-01
    Get full text
    Article
    Save to List
    Saved in:
  5. 5
    Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction

    Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction by M. Mohammed Ibrahim, R. Venkatesan, Nasir Ali, Muhammad Imran Qureshi, Hafiz Muhammad Afzal Siddiqui, Fikadu Tesgera Tolasa, Suhad Ali Osman Abdallah

    Published 2025-04-01
    Get full text
    Article
    Save to List
    Saved in:

Search Tools:

  • RSS Feed
  • Email Search

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Explore Channels
  • Course Reserves
  • New Items

Need Help?

  • Search Tips
  • Ask a Librarian
  • FAQs