If you made any changes in Pure these will be visible here soon.

Personal profile

Research Interests

Computer Engineering

External positions

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 7 Similar Profiles
Steganography Engineering & Materials Science
Signal to noise ratio Engineering & Materials Science
Wavelet transforms Engineering & Materials Science
Discrete wavelet transforms Engineering & Materials Science
Cryptography Engineering & Materials Science
Transmission control protocol Engineering & Materials Science
Image matching Engineering & Materials Science
Binary trees Engineering & Materials Science

Research Output 2007 2018

  • 50 Citations
  • 4 h-Index
  • 6 Conference contribution
  • 6 Article

Adaptive downlink packet scheduling in LTE networks based on queue monitoring

Adesh, N. D. & Renuka, A., 14-03-2018, (Accepted/In press) In : Wireless Networks. p. 1-18 18 p.

Research output: Contribution to journalArticle

Scheduling
Throughput
Resource allocation
Monitoring
Quality of service

Impact of traffic burst on the behavior of TCP variants for different LTE downlink schedulers

Adesh, N. D. & Renuka, A., 19-06-2018, Proceedings of the 2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology, iCATccT 2017. Institute of Electrical and Electronics Engineers Inc., p. 18-23 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Transmission control protocol
Scheduling
Scheduling algorithms
Resource allocation
Throughput

Information hiding through dynamic text steganography and cryptography: Computing and informatics

Bhat, D., Krithi, V., Manjunath, K. N., Prabhu, S. & Renuka, A., 30-11-2017, 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 1826-1831 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Cryptography
Data communication systems
Electronic commerce
Electronic mail
4 Citations
Steganography
Wavelet transforms
Internet
performance

High capacity video steganography technique in transform domain

Hemalatha, S., Dinesh Acharya, U. & Renuka, A., 01-07-2016, In : Pertanika Journal of Science and Technology. 24, 2, p. 411-422 12 p.

Research output: Contribution to journalArticle

Steganography
Surgical Instruments
transform
methodology
video