Items where Author is "Renuka, A"
Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 30.

Article

Sapna, S and Renuka, A (2020) Computer-aided system for Leukocyte nucleus segmentation and Leukocyte classification based on nucleus characteristics. International Journal of Computers and Applications, 42 (6). pp. 622-633. ISSN 1206-212X

Adesh, N D and Renuka, A (2019) Adaptive Receiver-Window Adjustment for Delay Reduction in LTE Networks. Journal of Computer Networks and Communications, 2019 (1). pp. 1-17. ISSN 2090-7141

Adesh, N D and Renuka, A (2019) Adaptive downlink packet scheduling in LTE networks based on queue monitoring. Wireless Networks, 25 (6). pp. 3149-3166. ISSN 1572-8196

Adesh, N D and Renuka, A (2019) Avoiding queue overflow and reducing queuing delay at eNodeB in LTE networks using congestion feedback mechanism. Computer Communications, 146. pp. 131-143. ISSN 0140-3664

Shenoy, Padmaja Ananth and Vishwanath, Shashidhar and Gawda, Ashwini and Shetty, Seema and Renuka, A and Varma, Muralidhar and Mukhopadhyay, Chiranjay and Chawla, Kiran (2017) Anaerobic bacteria in clinical specimens – Frequent, but a neglected lot: A five year experience at a tertiary care hospital. Journal of Clinical and Diagnostic Research, 11 (7). DC44-DC48. ISSN 0973-709X

Hemalatha, S and Acharya, Dinesh U and Renuka, A (2016) High Capacity Video Steganography Technique in Transform Domain. Pertanika Journal of Science and Technology, 24 (2). pp. 411-422. ISSN 0128-7680

Hemalatha, S and Acharya, Dinesh U and Renuka, A (2016) Audio data hiding technique using integer wavelet transform. International Journal of Electronic Security and Digital Forensics, 8 (2). pp. 131-147.

Hemalatha, S and Acharya, Dinesh U and Renuka, A and Deepti, S and Upadhya, Jyothi K (2015) Audio Steganography in Discrete Wavelet Transform Domain. International Journal of Applied Engineering Research, 10 (16). pp. 36639-36644. ISSN 1087-1090

Hemalatha, S and Acharya, Dinesh U and Renuka, A (2015) Wavelet transform based steganography technique to hide audio signals in image. Procedia Computer Science, 47. pp. 272-281.

Hemalatha, S and Acharya, Dinesh U and Renuka, A (2013) Comparison of secure and high capacitycolor image steganography techniques in RGB and YCBCR domains. International Journal of Advanced Information Technology, 3 (3). pp. 1-9. ISSN 2231-1548

Hemalatha, S and Acharya, Dinesh U and Renuka, A and Kamath, Priya R (2013) A Secure Color Image Steganography in Transform Domain. International Journal on Cryptography and Information Security, 3 (1).

Hemalatha, S and Acharya, Dinesh U and Renuka, A and Kamath , Priya R (2013) An Integer Wavelet Transform Based Steganography Technique for Color Images. International Journal of Information & Computation Technology, 3 (1). pp. 13-24. ISSN 0974-2239

Hemalatha, S and Acharya, Dinesh U and Renuka, A and Kamath, Priya R (2013) A Secure and high capacity Image Stenography Technique. Signal & Image Processing : An International Journal (SIPIJ), 4 (1). pp. 83-89. ISSN 2229-3922

Renuka, A and Shet, K C (2009) Cluster Based Group Key Management in Mobile Ad hoc Networks. International Journal of Computer Science and Network Security,, 9 (4). pp. 42-49.

Renuka, A and Shet, K C (2009) Hierarchical Approach for Key Management in Mobile Ad hoc Networks. International Journal of Computer Science and Information Security,, 5 (1). pp. 87-95. ISSN 1947-5500

Conference or Workshop Item

Bhargavi, U S and Gundibail, Shivaprasad and Manjunath, K N and Renuka, A (2019) Security of Medical Big Data Images using Decoy Technique. In: International Conference on Automation, Computational and Technology Management ICACTM 2019, 24/04/2019, Amity University,London.

Adesh, N D and Renuka, A (2018) Rotation-based LTE downlink resource scheduling using queue status monitoring. In: International Conference on Computer Communication and Informatics (ICCCI -2012, Jan. 04 - 06, 2018, Coimbatore, INDIA.

Adesh, N D and Renuka, A (2017) Impact of traffic burst on the behavior of TCP variants for different LTE downlink schedulers. In: International Conference on Applied and Theoretical Computing and Communication Technology, 21/12/2017, SSIT, Tumkur, Karnataka.

Bhat, Deepali and Krithi, V and Manjunath, K N and Prabhu, Srikanth and Renuka, A (2017) Information Hiding through Dynamic Text Steganography and Cryptography. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2013, 13/09/2017, MIT Manipal.

Hemalatha, S and Renuka, A and Shamathmika, . (2017) MP3 Audio Steganography with Improved Capacity and Robustness. In: International Conference on Applied Sciences, Engineering and Technology, 10/07/2017, MIT, Manipal.

Hemalatha, S and Renuka, A and Shamathmika, . (2017) MP3 Audio Steganography with Improved Capacity and Robustness. In: International Conference on Applied Sciences, Engineering and Technology, 10/07/2017, MIT, Manipal.

Sapna, S and Renuka, A (2017) Techniques for Segmentation and Classification of Leukocytes in Blood Smear Images- A Review. In: International Conference on Computational Intelligence and Computing Research, 14/12/2017, Tamilnadu College of Engineering, Coimbatore.

Deepthi, S and Renuka, A and Hemalatha, S and Upadhya, Jyothi K (2014) Secure audio steganography using lifting wavelet Transform. In: Fifth International conference on Advances in Computer Engineering, 26 to 27 December 2014.

Deepti, S and Renuka, A and Hemalatha, S (2013) Data hiding in audio signals using wavelet transform with enhanced security. In: Second International Conference on Digital image processing and vision, 20th – 21st December 2013.

Kamath, Priya R and Hemalatha, S and Acharya, Dinesh U and Renuka, A (2012) High Quality Technique for Image Steganography using Discrete Wavelet Transform. In: Proceedings of National Conference on Advances in Computer Science & Information Security ACSIS12, 6-7 January 2012 , Manipal Institute of Technology, Manipal , India. (Submitted)

Hemalatha, S and Acharya, Dinesh U and Renuka, A and Kamath, Priya R (2012) A Novel Image Steganography Technique for Grey Scale Image using Discrete Wavelet Transform. In: First National Conference on Cyber Security (NCCS – 12) , 7 & 8 June 2012, Pune .

Hemalatha, S and Acharya, Dinesh U and Renuka, A and Kamath, Priya R (2012) A Secure Image Steganography Technique Using Integer Wavelet Transform. In: World Congress on Information and Communication Technologies.

Hemalatha, S and Acharya, Dinesh U and Renuka, A and Kamath, Priya R (2010) A Novel ColorImage Steganography using Discrete Wavelet Transform. In: proceedings .

Hemalatha, S and Acharya, Dinesh U and Renuka, A and Kamath, Priya R (2010) A Secure Image Steganography Technique to Hide Multiple Secret Images. In: The Fourth International Conference on Network & Communications Security (NetCom 2012).

Renuka, A and Shet, K C (2008) Key Management Using K-Dimensional Trees. In: International Conference on ADCOM 2008, 14-17 Dec. 2008 , Chennai.

This list was generated on Sat Jan 29 14:00:46 2022 UTC.