Back close
Publications
Deformed character recognition using convolutional neural networks

Citation : Shobha Rani N., Chandan, N., Sajan Jain, and Hena Kiran, “Deformed character recognition using con ...

Publisher :International Journal of Engineering and Technology(UAE)

Publications
Image segmentation technique- A comparative study

Citation : Brunda, R., Divyashree, B., Shobha Rani, N., "Image segmentation technique- A comparative study," In ...

Publisher :International Journal of Engineering and Technology(UAE),

Publications
A unified preprocessing technique for enhancement of degraded document images

Citation : Shobha Rani, N., Sajan Jain, A., Kiran, H.R., "A unified preprocessing technique for enhancement of ...

Publisher :Lecture Notes in Computational Vision and Biomechanics

Publications
Web application vulnerability detection using hybrid string matching algorithm

Citation : Santhosh Kumar, B.J., Pujitha, K.. "Web application vulnerability detection using hybrid string matc ...

Publisher :International Journal of Engineering and Technology(UAE)

Publications
Vulnerability detection and prevention of SQL injection

Citation : Santhosh Kumar, B.J., Anaswara, P.P., "Vulnerability detection and prevention of SQL injection," Int ...

Publisher :International Journal of Engineering and Technology(UAE)

Publications
Better load balancer design for signaling server in WebRTC communication

Citation : Santhosh Kumar B. J., Sankar N., and Karthika V. G., “Better load balancer design for signaling se ...

Publisher :International Journal of Engineering and Technology(UAE)

Publications
An advanced hierarchical attribute based encryption access control in mobile cloud computing

Citation : Sreelesh N. K. and Santhosh Kumar B. J., “An advanced hierarchical attribute based encryption acce ...

Publisher :International Journal of Engineering and Technology(UAE)

Publications
Advance identification of cloning attacks in online social networks

Citation : Prasad, M.R., Santhosh Kumar, B.J., "Advance identification of cloning attacks in online social netw ...

Publisher :International Journal of Engineering and Technology(UAE)

Publications
Challenges of Women Entrepreneurs ? A case Study with Special Reference to SME Industries in coorg, Karnataka

Citation : Preethu Gowramma A A. and Ranjith Kumar S., “Challenges of women entrepreneurs ? a case study with ...

Publisher :International Journal of Mechanical Engineering and Technology, IAEME Publication.,

Publications
Application of TQM Practices and Sectorial Implications in Industry- A case Study on Brewing Industry

Citation : Ranjith Kumar, S., Nandgopal, P. Application of TQM practices and sectorial implications in industry ...

Publisher :(2018) International Journal of Mechanical and Production Engineering Research and Development

Publications
A Study on Impact of GST on Miscellaneous Industry

Citation : Ashok, A., Ranjith Kumar, S. A study on impact of GST on miscellaneous industry; gold (2018) Interna ...

Publisher :(2018) International Journal of Mechanical Engineering and Technology

Publications
A new technique for data encryption using DNA sequence

Citation : Pushpa, B.R., "A new technique for data encryption using DNA sequence," Proceedings of 2017 Internat ...

Publisher :2017 International Conference on Intelligent Computing and Control

Admissions Apply Now