关注
Rengarajan A
Rengarajan A
未知所在单位机构
在 jainuniversity.ac.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
Trust based authentication technique for cluster based vehicular ad hoc networks (VANET)
R Sugumar, A Rengarajan, C Jayakumar
Wireless Networks 24 (2), 373-382, 2018
1082018
Data hiding in encrypted images using Arnold transform
MR Khanna
International Conference on Algorithms, 2017
242017
A technique to stock market prediction using fuzzy clustering and artificial neural networks
R Sugumar, A Rengarajan, C Jayakumar
Computing and Informatics 33 (5), 992-1024, 2014
172014
Puzzle based highly secure steganography
SS Shankar, A Rengarajan
2017 International Conference on Algorithms, Methodology, Models and …, 2017
142017
Video-thoracoscopic management of postpneumonectomy empyema
D Galetta, L Spaggiari
The Thoracic and Cardiovascular Surgeon 66 (08), 701-706, 2018
122018
Unreliable node detection by Elliptical Curve Diffe-Hellman algorithm in MANET
SJJ Thangaraj, A Rengarajan
Indian Journal of Science and Technology 9 (19), 1-6, 2016
112016
Delay reduction by providing location based services using hybrid cache in peer to peer networks
CG Krishnan, A Rengarajan, R Manikandan
KSII Transactions on Internet and Information Systems (TIIS) 9 (6), 2078-2094, 2015
102015
Extending K-anonymity to privacy preserving data mining using association rule hiding algorithm
R Sugumar, A Rengarajan, M Vijayanand
International Journal of Advanced Research in Computer Science and Software …, 2012
72012
The Washington Manual of Medical Therapeutics Paperback
Z Crees, C Fritz, A Huedebert, J Noe, A Rengarajan, X Wang
Lippincott Williams & Wilkins, 2019
62019
Comprehensive Learning on Characteristics, Applications, Issues and Limitations of Manets
SJJ Thangaraj, A Rengarajan, S Selvanayaki
International Journal of Innovative Technology and Exploring Engineering …, 2019
52019
DATA HIDING IN ENCRYPTED IMAGES USING ARNOLD TRANSFORM.
A Rengarajan
ICTACT Journal on Image & Video Processing 7 (1), 2016
42016
Secure verification technique for defending IP spoofing attacks.
A Rengarajan, R Sugumar, C Jayakumar
Int. Arab J. Inf. Technol. 13 (2), 302-309, 2016
42016
SPCACF: Secured privacy-conserving authentication scheme using cuckoo filter in VANET
A Rengarajan, MM Thaha
Scalable Computing: Practice and Experience 21 (1), 101-105, 2020
32020
A novel method for energy effectiveness by employing adaptive node coverage region
A Rengarajan, S Rajasekaran, H Siramdasu, N Insozhan
Indian Journal of Science and Technology 9 (2), 1-6, 2016
22016
Reliable Transmission with Flawless Power Proportion in Low defined signal Disseminate Systems
A Rengarajan, S Rajasekaran, SJJ Thangaraj
Global Journal of Pure and Applied Mathematics 11 (5), 3337-3347, 2015
22015
Video assisted thoracoscopic surgery for chronic post-pneumonic empyema: A missed opportunity?
RS Jutley, A Conybeare, A Rengarajan, DA Waller
Thorax 60, II31-II31, 2005
22005
Video assisted pleural decortication for empyema
A Rengarajan, I Oey, S Shawkat, DA Waller
THORAX-LONDON- 53, P111-P111, 1998
21998
Secure and traceable medical image sharing using enigma in cloud?
R Manikandan, A Rengarajan, C Devibala, K Gayathri, T Malarvizhi
Emerging Trends in Computing and Expert Technology, 816-825, 2020
12020
An Efficient Lightweight Proactive Source Routing Protocol for Handling Overhead, Packet Delivery, Throughput in MANETS
A Rengarajan, S Rajasekaran, P Kumaran
Computation and Communication Technologies, 27, 2016
12016
Design a Weight Based Sorting Distortion Algorithm for Privacy Preserving Data Mining
R Sugumar, A Rengarajan, C Jayakumar
Middle-East Journal of Scientific Research 23 (3), 405-412, 2015
12015
系统目前无法执行此操作,请稍后再试。
文章 1–20