Back close
Publications
Productivity and stock price reaction to spin-off decision

Publisher :Corporate Ownership and Control

Publications
Product demand forecasting: Will this product sell

Publisher :International Journal of Applied Engineering Research

Publications
Procurement and distribution of medicines in government sector of Kerela – An overview

Publisher :International Journal of Pharmaceutical Sciences Review and Research

Publications
Process Simulation and Modeling of Fluidized Catalytic Cracker Performance in Crude Refinery

Citation : N. Rajeev, Dr. Krishna Prasad R., and Dr. Udaya Bhaskar Reddy Ragula, “Process Simulation and Mode ...

Publisher :Petroleum Science and Technology

Publications
Process Modeling and Particle Flow Simulation of Sand Separation in Cyclone Separator

Citation : S. P Sankar and Dr. Krishna Prasad R., “Process Modeling and Particle Flow Simulation of Sand Sepa ...

Publisher :Particulate Science and Technology

Publications
Probability and Random Processes

Publisher :New Delhi: IK International

Publications
Probabilistic prediction based scheduling for delay sensitive traffic in internet of things

Citation : R. Sharma, Dr. Navin Kumar, Gowda, N. B., and Srinivas, T., “Probabilistic prediction based schedu ...

Publisher :Procedia Computer Science

Publications
A Probabilistic Method Toward SLAM for Mobile Robotic Systems

Citation : R. S. Anoop, Dr. Gireesh K. T., and Saisuriyaa, G., “A Probabilistic Method Toward SLAM for Mobile ...

Publisher :Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 1

Publications
Probabilistic activity estimator and timing analysis for LUT based circuits

Citation : Ramesh S. R. and Jayaparvathy, R., “Probabilistic activity estimator and timing analysis for LUT b ...

Publisher :Research India Publications

Publications
Privacy Preservation and Content Protection in Location Based Queries

Citation : Greeshma Sarath and S.H, M. Lal, “Privacy Preservation and Content Protection in Location Based Qu ...

Publisher :Proceedings of the 2015 Eighth International Conference on Contemporary Computing (IC3)

Publications
The Prey becoming the predator : Reading of Auden’s Refugee Blues and Darwish’s Identity Card as a political discourse

Citation : Deepa Kumari S. and Smita Sail, “The Prey becoming the predator : Reading of Auden’s Refugee Blu ...

Publisher :National Conference on Multi-disciplinary approach to Literature in English and English Langauge

Publications
Prevention of man-in-the-middle phishing attack using pair based authentication

Citation : D. P. Correya, Gopinath, D., and N.S. Nair, “Prevention of man-in-the-middle phishing attack using ...

Publisher :International Journal of Applied Engineering Research

Admissions Apply Now