Search

Your search keyword '"Amirtharajan Rengarajan"' showing total 285 results

Search Constraints

Start Over You searched for: Author "Amirtharajan Rengarajan" Remove constraint Author: "Amirtharajan Rengarajan"
285 results on '"Amirtharajan Rengarajan"'

Search Results

252. Authenticated wireless image sensor secret network - Graph guided steganography.

253. Seeable visual but not sure of it.

254. An efficient medical data encryption scheme using selective shuffling and inter-intra pixel diffusion IoT-enabled secure E-healthcare framework.

255. Enhanced grinding process of a cement ball mill through a generalised predictive controller integrated with a CARIMA model.

256. MUX induced Ring oscillators for encrypted Nano communication via Quantum Dot Cellular Automata.

257. Diagnosis of breast cancer for modern mammography using artificial intelligence.

258. Enhancing pneumonia detection with masked neural networks: a deep learning approach.

259. DNA-chaos governed cryptosystem for cloud-based medical image repository.

260. Let wavelet authenticate and tent-map encrypt: a sacred connect against a secret nexus.

261. Design of Permanent Magnet Brushless DC Motor Drive System for Energy Recouping in an Electric Automobile.

262. Design of Low-Power 10-Transistor Full Adder Using GDI Technique for Energy-Efficient Arithmetic Applications.

263. Neural Attractor-Based Adaptive Key Generator with DNA-Coded Security and Privacy Framework for Multimedia Data in Cloud Environments.

264. Dual-Domain Image Encryption in Unsecure Medium—A Secure Communication Perspective.

265. A comprehensive review on Advanced Process Control of cement kiln process with the focus on MPC tuning strategies.

266. Robust respiratory disease classification using breathing sounds (RRDCBS) multiple features and models.

267. Two-tier search space optimisation technique for tuning of explicit plant-model mismatch in model predictive controller for industrial cement kiln process.

268. Neural-assisted image-dependent encryption scheme for medical image cloud storage.

269. ROI-based medical image watermarking for accurate tamper detection, localisation and recovery.

270. An efficient medical image encryption using hybrid DNA computing and chaos in transform domain.

271. Hopfield attractor-trusted neural network: an attack-resistant image encryption.

272. Tamper-Resistant Secure Medical Image Carrier: An IWT–SVD–Chaos–FPGA Combination.

273. Entropy Influenced RNA Diffused Quantum Chaos to Conserve Medical Data Privacy.

274. ON[sbnd]Chip peripherals are ON for chaos – an image fused encryption.

275. Encryption and watermark-treated medical image against hacking disease—An immune convention in spatial and frequency domains.

276. Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller.

277. Security analysis of reversible logic cryptography design with LFSR key on 32-bit microcontroller.

278. Predicting agricultural and meteorological droughts using Holt Winter Conventional 2D-Long Short-Term Memory (HW-Conv2DLSTM).

279. A simple embed over encryption scheme for DICOM images using Bülban Map.

280. A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach.

281. Networked medical data sharing on secure medium - A web publishing mode for DICOM viewer with three layer authentication.

282. DNA Chaos Blend to Secure Medical Privacy.

283. Chaos based crossover and mutation for securing DICOM image.

284. Stego on FPGA: an IWT approach.

285. A graph theory practice on transformed image: a random image steganography.

Catalog

Books, media, physical & digital resources