1,838 results on '"Venkatesan, A."'
Search Results
2. Baby PIH: Parameterized Inapproximability of Min CSP.
3. Governance-Focused Classification of Security and Privacy Requirements from Obligations in Software Engineering Contracts.
4. Design Framework for Ferroelectric Gate Stack Engineering of Vertical NAND Structures for Efficient TLC and QLC Operation.
5. Comprehensive Time Dependent Dielectric Breakdown (TDDB) Characterization of Ferroelectric Capacitors Under Bipolar Stress Conditions.
6. Randomly Punctured Reed-Solomon Codes Achieve List-Decoding Capacity over Linear-Sized Fields.
7. Parameterized Inapproximability Hypothesis under Exponential Time Hypothesis.
8. Ontology for Contextual Fake News Assessment Based on Text and Images.
9. An Article a Day: Towards Personal Informatics for Healthy News Consumption.
10. Inkeraction: An Interaction Modality Powered by Ink Recognition and Synthesis.
11. AG codes have no list-decoding friends: Approaching the generalized Singleton bound requires exponential alphabets.
12. Vision Transformer Computation and Resilience for Dynamic Inference.
13. Trade-Off Between Beamforming and Macro-Diversity Gains in Distributed mMIMO.
14. Study of three-point impulsive boundary value problems governed by Ψ-Caputo fractional derivative.
15. Exploring statistical approaches for predicting student dropout in education: a systematic review and meta-analysis.
16. Energy-Aware Federated Learning for AQI Pollutants Forecasting in Edge Networks.
17. Improved Meta-Heuristic Technique to FIR Filter Design and Application.
18. Introduction to the Special Issue on Next Generation Pervasive Reconfigurable Computing for High Performance Real Time Applications.
19. A priority aware local mutual exclusion algorithm for flying ad hoc networks.
20. Heterogeneous Workload-Based Consumer Resource Recommendation Model for Smart Cities: eHealth Edge-Cloud Connectivity Using Federated Split Learning.
21. Forecasting Land-Use and Land-Cover Change Using Hybrid CNN-LSTM Model.
22. Modified Playfair for Text File Encryption and Meticulous Decryption with Arbitrary Fillers by Septenary Quadrate Pattern.
23. Early predictive model for breast cancer classification using blended ensemble learning.
24. Utilization of IoT-assisted computational strategies in wireless sensor networks for smart infrastructure management.
25. A novel L1-Predictor-Corrector method for the numerical solution of the generalized-Caputo type fractional differential equations.
26. Investigation of controllability and stability of fractional dynamical systems with delay in control.
27. Security-aware IoT botnet attack detection framework using dilated and cascaded deep learning mechanism with conditional adversarial autoencoder-based features.
28. Sybil attack detection in ultra-dense VANETs using verifiable delay functions.
29. CERMF-Net: A SAR-Optical Feature Fusion for Cloud Elimination From Sentinel-2 Imagery Using Residual Multiscale Dilated Network.
30. Optimizing Walmart's Supply Chain from Strategy to Execution.
31. Intelligent Recognition of Multimodal Human Activities for Personal Healthcare.
32. Efficient Bidirectional Wireless Power Transfer System Control Using Dual Phase Shift PWM Technique for Electric Vehicle Applications.
33. A Compact Boat Shaped Dual-Band MIMO Antenna With Enhanced Isolation for 5G/WLAN Application.
34. Fuzzy Logic Controlled Pulse Density Modulation Technique for Bidirectional Inductive Power Transfer Systems.
35. An Adaptive Threshold-Based Modified Artificial Bee Colony Optimization Technique for Virtual Machine Placement in Cloud Datacenters.
36. A Comprehensive Review on Efficiency Enhancement of Wireless Charging System for the Electric Vehicles Applications.
37. Data-Driven Intelligent Condition Adaptation of Feature Extraction for Bearing Fault Detection Using Deep Responsible Active Learning.
38. Integrated shared random key agreement protocol for wireless sensor network.
39. An optimal and smart E-waste collection using neural network based on sine cosine optimization.
40. PIRAP: AASM: An Advanced Attribute-Based Security Model for Enhancing Trustworthy Data Sharing in Cloud Computing.
41. A Framework of Digital Twins for Improving Respiratory Health and Healthcare Measures.
42. Genetic Bottleneck and the Emergence of High Intelligence by Scaling-out and High Throughput.
43. Tight bounds for stream decodable error-correcting codes.
44. Quantifying impairment and disease severity using AI models trained on healthy subjects.
45. Isolate and then Identify: Rethinking Adaptive Group Testing.
46. Near-Tight Bounds for 3-Query Locally Correctable Binary Linear Codes via Rainbow Cycles.
47. Reservoir computing with logistic map.
48. Exponential Time Approximation for Coloring 3-Colorable Graphs.
49. Outlier Robust Multivariate Polynomial Regression.
50. Capacity-Achieving Gray Codes.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.