Back close
Publications
Semiotic analysis of Indian television. advertisements and its impact on consumers: An exploratory study [Analyse sémiotique de télévision indienne: Publicité et son impact sur les consommateurs: Une étude exploratoire]

Citation : P. Sharma and Dr. Priya Gupta, “Semiotic analysis of Indian television. advertisements and its imp ...

Publisher :ESSACHESS - Journal for Communication Studies

Publications
Self-assembled gold nanofilms as a simple, recoverable and recyclable catalyst for nitro-reduction

Citation : M. Mohan, Mohan, N., Chand, D. Kumar, and Dr. Madhu Mohan N., “Self-assembled gold nanofilms as a ...

Publisher :The Royal Society of Chemistry

Publications
Self-Adaptive Interface for Comprehensive Authoring

Citation : R. Ravi, A. Kumar, Kamal Bijlani, Sharika, T. R., A.P., J., and D., A. - J., “Self-Adaptive Interf ...

Publisher :Procedia Computer Science

Publications
Selection of new product: A case of Clay-Pot-Refrigerator

Citation : Dr. Suresh M., “Selection of new product: A case of Clay-Pot-Refrigerator”, in IEOM 2015 - 5th I ...

Publisher :IEOM 2015 - 5th International Conference on Industrial Engineering and Operations Management, Proceeding

Publications
Selection of communication technology for smart distribution grid

Citation : P. Sivraj and K., S. K., “Selection of communication technology for smart distribution grid”, In ...

Publisher :International Journal of Applied Engineering Research

Publications
Selected summaries

Publisher :Annals of Pediatric Cardiology

Publications
Seizure precipitant factors among persons with epilepsy with a view to develop a teaching module

Citation : M. Gigini George and Kanmani J, “Seizure precipitant factors among persons with epilepsy with a vi ...

Publisher :International Journal of Current Research

Publications
Security, Trust and Implementation Limitations of Prominent IoT Platforms

Citation : Shiju Sathyadevan, Kalarickal, B. S., and M. K. Jinesh, “Security, Trust and Implementation Limita ...

Publisher :Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014: Volume 2, Advances in Intelligent Systems and Computing

Publications
Security maturity in NoSQL databases – Are they secure enough to haul the modern IT applications?

Publisher :2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015

Publications
Security incident management in ground transportation system using UAVs

Citation : Ra Reshma, Ramesh, T. Ka, and P. Sathish Kumar, “Security incident management in ground transporta ...

Publisher :2015 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2015

Publications
Security Enhancement of Handover Key Management Based on Media Access Control Address in 4G LTE Networks

Citation : Dr. Senthil Kumar M. and Krishnamoorthy, V., “Security Enhancement of Handover Key Management Base ...

Publisher :IEEE

Admissions Apply Now