Browsing by Subject Information Science

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 121  next >
Issue DateTitleAuthor(s)
2016-05Applications of Big Data in various Domains.Kumarasamy, M.; Suresh Babu, G. N. K.
2015Borderline coverage analysis of a wireless sensor network under random deployment using the union of collinear chords.Mamatha, G.; Premasudha, B. G.
2010Call Admission Control Mechanism for optimal QoS in Next Generation Wireless Networks.Babu, H. S. Ramesh; Gowrishankar; Satyanarayana, P. S.
2013-09Centralized Heart Rate Monitoring and Automated Message Alert System using WBAN.Venugopal, Kala; Kumar, Amit
2014-02A Comparative Study on Advances in LEACH Routing Protocol for Wireless Sensor Networks: A surveyBarman, Alakesh; Umapathi, G. R.
2014-02A Comparative Study on Advances in LEACH Routing Protocol for Wireless Sensor Networks: A survey.Braman, Alakesh.; Umapathi, G. R.
2013-10A Comparison of Various Edge Detection Techniques for Kannada Text Image DocumentUshaKumari; Tanuja, K.
2014-01A Comprehensive Study on Channel Assignment in Wireless Mesh NetworksKusuma, M.; Umapathi, G. R.
2014-01A Comprehensive Study on Channel Assignment in Wireless Mesh Networks.Kusuma, M.; Umapathi, G. R.
2013-12Data Management using Ring-based Index for Wireless Sensor NetworksDasprakash, G.; Manjunath, T. N.; Rajkumar, Kanche
2014-12Design Methodologies of Transaction-Safe Cluster Allocations in TFAT File System for Embedded Storage DevicesMunegowda, Keshava; Raju, G. T.; Raju, Veera Manikandan; Manjunath, T. N.
2015-07Efficient Keyword Search Techniques over Cloud Data in Cloud Computing.Gayathri, M. R.; Srinivas, K.
2014-04An efficient method for classification of rice grains using Morphological processVeena, H.; Latharani, T. R.
2014-11Energy Efficient Routing Techniques in Wireless Sensor Network.Chayapathi, A. R.; Ravitheja, S.
2014-08Fuzzy Logic based Call Admission Control for Next Generation Wireless Networks.Mahesh, G.; Yeshwanth, S.; Gowrishankar
2015-05Handwritten Hindi Character Recognition System Using Edge detection & Neural NetworkTanuja, K.; Usha Kumari, V.; Sushma, T. M.
2014-07HASH Mechanism to Secure the AODV Protocol in MANETsSudarsanan, D.; Megha, J.
2014-07Ileach- An Integrated Leach Routing Protocol for Elongating The Network Lifetime for WSNUmapathi, G. R.; Berman, Alakesh; Ramesh babu, H. S.
2014Implementation of Optimization of Latency in Wireless Mesh Network.Kusuma, M.; Umapathi, G. R.
2019-12Information Science (M.Tech) 2019-2020-