551 results on '"Laxmi, Vijay"'
Search Results
2. Identification of New Sources for Good Quality High Biomass Yield and other Promising Traits in Mini Core Collection of Forage Sorghum
3. Integration ofm-learning practices in teacher education
4. Honeypot-Based Data Collection for Dark Web Investigations Using the Tor Network
5. High temperature stress and its implication on growth, biomass and yield of normal and late seeded fieldpea genotypes
6. Navigating the Concurrency Landscape: A Survey of Race Condition Vulnerability Detectors
7. A Survey of Side-Channel Attacks in Context of Cache -- Taxonomies, Analysis and Mitigation
8. Recent advances in two-dimensional perovskite materials for light-emitting diodes
9. Phenology, dry matter distribution and yield attributes under normal and drought stress conditions in lentil (Lens culinaris Medik.)
10. Anti-viral activity of Cassia fistula against IBR virus
11. Meta-QTL and ortho analysis unravels the genetic architecture and key candidate genes for cold tolerance at seedling stage in rice
12. Advanced nanoribbons in water purification: A comprehensive review
13. Adaptive distribution of control messages for improving bandwidth utilization in multiple NoC
14. Nanophotonic modulator based on Silicon-ITO heterojunction and slot waveguide with 2D-graphene sheet
15. Tunable mid-infrared broadband absorption in the atmospheric window of wavelength in 3–5 μm using VO2 phase transition in a three-layer metamaterial
16. An improved reconfiguration algorithm for handling 1-point NoC failures
17. ETGuard: Detecting D2D Attacks using Wireless Evil Twins
18. Silicon/graphene–ITO multiple heterojunctions and 1D PhC waveguide-based photodetection for mid-NIR IPE with high responsivity
19. Polarization-Independent Broadband Metasurface Absorber for Near Infrared Spectrum
20. Ultra-Broadband Absorber Based on Metasurfaces in the Infrared Regime
21. Dense spatially-weighted attentive residual-haze network for image dehazing
22. Pre-Silicon NBTI Delay-Aware Modeling of Network-on-Chip Router Microarchitecture
23. QoS-aware Mesh based Multicast Routing Protocols in Ad-Hoc Networks: Concepts and Challenges
24. Visibility enhancement and dehazing: Research contribution challenges and direction
25. Supervısed Learnıng Algorıthm: A Survey
26. A Performance Discussion of Web Crawler Using Some Advanced Factors
27. Performance evaluation of task scheduling algorithms in virtual cloud environment to minimize makespan
28. MapperDroid: Verifying app capabilities from description to permissions and API calls
29. Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions
30. Android Inter-App Communication Threats and Detection Techniques
31. Scaling & fuzzing: Personal image privacy from automated attacks in mobile cloud computing
32. Unsupervised Person Re-ID in Surveillance Feed Using Re-ranking
33. APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android
34. DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks
35. Bloom Filter Based Privacy Preserving Deduplication System
36. Protecting black phosphorus with selectively adsorbed graphene quantum dot layers
37. A Novel Method of Data Partitioning Using Genetic Algorithm Work Load Driven Approach Utilizing Machine Learning
38. MAPPER: Mapping Application Description to Permissions
39. SneakLeak+: Large-scale klepto apps analysis
40. TRACK: An algorithm for fault-tolerant, dynamic and scalable 2D mesh network-on-chip routing reconfiguration
41. SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage
42. EspyDroid+: Precise reflection analysis of android apps
43. Secure Proof of Ownership Using Merkle Tree for Deduplicated Storage
44. Performance Analysis of Various Congestion Control Schemes in VANET
45. Privacy Preserving Data Offloading Based on Transformation
46. Intellectual Property Rights
47. Unraveling Reflection Induced Sensitive Leaks in Android Apps
48. SWORD: Semantic aWare andrOid malwaRe Detector
49. S2DIO: an extended scalable 2D mesh network-on-chip routing reconfiguration for efficient bypass of link failures
50. You click, I steal: analyzing and detecting click hijacking attacks in web pages
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.