If you made any changes in Pure these will be visible here soon.

Research Output 2007 2019

  • 67 Citations
  • 4 h-Index
  • 9 Conference contribution
  • 8 Article
2019

Adaptive downlink packet scheduling in LTE networks based on queue monitoring

Adesh, N. D. & Renuka, A., 01-08-2019, In : Wireless Networks. p. 1-18 18 p.

Research output: Contribution to journalArticle

Scheduling
Throughput
Resource allocation
Monitoring
Quality of service

Adaptive Receiver-Window Adjustment for Delay Reduction in LTE Networks

Adesh, N. D. & Renuka, A., 01-01-2019, In : Journal of Computer Networks and Communications. 2019, 3645717.

Research output: Contribution to journalArticle

Open Access
Base stations
Throughput
Experiments

Avoiding queue overflow and reducing queuing delay at eNodeB in LTE networks using congestion feedback mechanism

N.D., A. & A., R., 15-10-2019, In : Computer Communications. 146, p. 131-143 13 p.

Research output: Contribution to journalArticle

Flow control
Feedback
Network layers
Throughput

Security of Medical Big Data Images using Decoy Technique

Bhargavi, U. S., Gundibail, S., Manjunath, K. N. & Renuka, A., 01-04-2019, 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019. Institute of Electrical and Electronics Engineers Inc., p. 310-314 5 p. 8776696. (2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

decoys
Radiology
intrusion
radiology
Healthcare
2018

Impact of traffic burst on the behavior of TCP variants for different LTE downlink schedulers

Adesh, N. D. & Renuka, A., 19-06-2018, Proceedings of the 2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology, iCATccT 2017. Institute of Electrical and Electronics Engineers Inc., p. 18-23 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Transmission control protocol
Scheduling
Scheduling algorithms
Resource allocation
Throughput

Rotation-based LTE downlink resource scheduling using queue status monitoring

Adesh, N. D. & Renuka, A., 20-08-2018, 2018 International Conference on Computer Communication and Informatics, ICCCI 2018. Institute of Electrical and Electronics Engineers Inc., 8441471. (2018 International Conference on Computer Communication and Informatics, ICCCI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

local thermodynamic equilibrium
scheduling
resources
Scheduling
Monitoring

Techniques for Segmentation and Classification of Leukocytes in Blood Smear Images - A Review

Sapna, S. & Renuka, A., 05-11-2018, 2017 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2017. Krishnan, N. & Karthikeyan, M. (eds.). Institute of Electrical and Electronics Engineers Inc., 8524465. (2017 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Blood
2017

Information hiding through dynamic text steganography and cryptography: Computing and informatics

Bhat, D., Krithi, V., Manjunath, K. N., Prabhu, S. & Renuka, A., 30-11-2017, 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 1826-1831 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Cryptography
Data communication systems
Electronic commerce
Electronic mail
2016
4 Citations (Scopus)
Steganography
Wavelet transforms
Internet
performance
2 Citations (Scopus)

High capacity video steganography technique in transform domain

Hemalatha, S., Dinesh Acharya, U. & Renuka, A., 01-07-2016, In : Pertanika Journal of Science and Technology. 24, 2, p. 411-422 12 p.

Research output: Contribution to journalArticle

Steganography
Surgical Instruments
transform
methodology
video
2015

Audio steganography in discrete wavelet transform domain

Hemalatha, S., Dinesh Acharya, U., Renuka, A., Deepthi, S. & Jyothi Upadhya, K., 01-09-2015, In : International Journal of Applied Engineering Research. 10, 16, p. 37544-37549 6 p.

Research output: Contribution to journalArticle

Steganography
Discrete wavelet transforms
Cryptography
Security of data
Signal to noise ratio
2014
30 Citations (Scopus)

Wavelet transform based steganography technique to hide audio signals in image

Hemalatha, S., Acharya, U. D. & Renuka, A., 2014, In : Procedia Computer Science. 47, C, p. 272-281 10 p.

Research output: Contribution to journalArticle

Steganography
Wavelet transforms
Cryptography
Signal to noise ratio
Security of data
2013
5 Citations (Scopus)

A secure image steganography technique to hide multiple secret images

Hemalatha, S., Dinesh Acharya, U., Renuka, A. & Kamath, P. R., 2013, Computer Networks and Communications, NetCom 2012 - Proceedings of the Fourth International Conference on Networks and Communications. Vol. 131 LNEE. p. 613-620 8 p. (Lecture Notes in Electrical Engineering; vol. 131 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Signal to noise ratio
Communication
Discrete wavelet transforms
Color
2012
3 Citations (Scopus)

A novel colorimage steganography using discrete wavelet transform

Hemalatha, S., Acharya, U. D., Renuka, A. & Kamath, P. R., 2012, Proceedings of the 2nd International Conference on Computational Science, Engineering and Information, CCSEIT 2012. p. 223-226 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Discrete wavelet transforms
Signal to noise ratio
Color
Communication
7 Citations (Scopus)

A secure image steganography technique using Integer Wavelet Transform

Hemalatha, S., Renuka, A., Dinesh Acharya, U. & Kamath, P. R., 2012, Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012. p. 755-758 4 p. 6409175

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Wavelet transforms
Signal to noise ratio
Signal processing
2008

Key management using k-dimensional trees

A, R. & Shet, K. C., 01-12-2008, Proceedings of the 2008 16th International Conference on Advanced Computing and Communications, ADCOM 2008. p. 52-57 6 p. 4760427

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary trees
Mobile ad hoc networks
Data structures
Data storage equipment
management
2007
16 Citations (Scopus)

Linear models of cumulative distribution function for content-based medical image retrieval

Manjunath, K. N., Renuka, A. & Niranjan, U. C., 12-2007, In : Journal of Medical Systems. 31, 6, p. 433-443 11 p.

Research output: Contribution to journalArticle

Image matching
Image retrieval
Distribution functions
Linear Models
Databases