If you made any changes in Pure these will be visible here soon.

Research Output 2007 2019

  • 63 Citations
  • 4 h-Index
  • 8 Conference contribution
  • 7 Article
Filter
Conference contribution
2018

Impact of traffic burst on the behavior of TCP variants for different LTE downlink schedulers

Adesh, N. D. & Renuka, A., 19-06-2018, Proceedings of the 2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology, iCATccT 2017. Institute of Electrical and Electronics Engineers Inc., p. 18-23 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Transmission control protocol
Scheduling
Scheduling algorithms
Resource allocation
Throughput

Rotation-based LTE downlink resource scheduling using queue status monitoring

Adesh, N. D. & Renuka, A., 20-08-2018, 2018 International Conference on Computer Communication and Informatics, ICCCI 2018. Institute of Electrical and Electronics Engineers Inc., 8441471. (2018 International Conference on Computer Communication and Informatics, ICCCI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

local thermodynamic equilibrium
scheduling
resources
Scheduling
Monitoring

Techniques for Segmentation and Classification of Leukocytes in Blood Smear Images - A Review

Sapna, S. & Renuka, A., 05-11-2018, 2017 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2017. Krishnan, N. & Karthikeyan, M. (eds.). Institute of Electrical and Electronics Engineers Inc., 8524465. (2017 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Blood
2017

Information hiding through dynamic text steganography and cryptography: Computing and informatics

Bhat, D., Krithi, V., Manjunath, K. N., Prabhu, S. & Renuka, A., 30-11-2017, 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 1826-1831 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Cryptography
Data communication systems
Electronic commerce
Electronic mail
2013
4 Citations (Scopus)

A secure image steganography technique to hide multiple secret images

Hemalatha, S., Dinesh Acharya, U., Renuka, A. & Kamath, P. R., 2013, Computer Networks and Communications, NetCom 2012 - Proceedings of the Fourth International Conference on Networks and Communications. Vol. 131 LNEE. p. 613-620 8 p. (Lecture Notes in Electrical Engineering; vol. 131 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Signal to noise ratio
Communication
Discrete wavelet transforms
Color
2012
3 Citations (Scopus)

A novel colorimage steganography using discrete wavelet transform

Hemalatha, S., Acharya, U. D., Renuka, A. & Kamath, P. R., 2012, Proceedings of the 2nd International Conference on Computational Science, Engineering and Information, CCSEIT 2012. p. 223-226 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Discrete wavelet transforms
Signal to noise ratio
Color
Communication
7 Citations (Scopus)

A secure image steganography technique using Integer Wavelet Transform

Hemalatha, S., Renuka, A., Dinesh Acharya, U. & Kamath, P. R., 2012, Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012. p. 755-758 4 p. 6409175

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Wavelet transforms
Signal to noise ratio
Signal processing
2008

Key management using k-dimensional trees

A, R. & Shet, K. C., 01-12-2008, Proceedings of the 2008 16th International Conference on Advanced Computing and Communications, ADCOM 2008. p. 52-57 6 p. 4760427

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary trees
Mobile ad hoc networks
Data structures
Data storage equipment
management