Back close
Publications
Intermolecular interactions in fluorinated tetraarylporphyrins: An experimental and theoretical study

Authors : Rahul Soman, , S. Sujatha,, S. De, , V. C. Rojisha, , P. Parameswaran, , B. Varghese , C. Arunkumar

Publisher :European Journal of Inorganic Chemistry

Publications
Quantitative crystal structure analysis of fluorinated porphyrins

Authors : Rahul Soman, , S. Sujatha, C. Arunkumar,

Publisher :Journal of Fluorine Chemistry

Publications
Transition of three dimensional wake of a flow past a heated cylinder

Authors : Dr. Ajith Kumar S.,, A. Sameen,, S. Anil Lal,

Publisher :IUTAM symposium on ”multiphase flows with phase change, challenges and oppurtunities”

Publications
A scheme for source separation of ground borne vibrations

Authors : R.S. Geethu, R.S. Geethu, M. Krishna Kumar, M. Krishna Kumar, K.V. Pramod, K.V. Pramod

Publisher :International Conference on Communication and Network Technologies,

Publications
An FPGA Implementation of linear & Circular Convolution

Authors : Anu Chalil, , J. Merin Philip

Publisher :IEEE National Conference on Electrical & Electronics Engineering

Publications
Extended Landmark Isomap for Data Classification

Authors : Dr. Manazhy Reshmi, P. Sankaran

Publisher :Eighth International Conference on Data Mining and Warehousing (ICDMW 2014),

Publications
Interfacing of permanent magnet synchronous generator wind energy system to gridusing a solid state transformer

Authors : T. S. Angel, , U. M

Publisher :proc.of International Conference on Computing of Power, Energy & Communication- ICCPEIC -2014

Publications
Architecture for service selection based on consumer feedback (FBSR) in service oriented architecture environment

Authors : Dr. Thangam S.;, Ezra, Kirubakaran; , William, J.

Publisher :Asian Journal of Information Technology

Publications
Improving the Security of Smart Cards through Multi- Curve ECC

Authors : Dr. Prakash G.;, Sakthivel S.

Publisher :Currently researchers are focusing on the techniques that could withstand and prevent the user’s secret data from the attacks. Cryptographic Smart cards are vulnerable to traditional mathematical attacks that exploit defects in cryptographic algorithms. H,

Publications
A New Second Order Accurate Kinetic Theory Based Scheme for Euler Equations

Authors : Raushan Kumar , Anoop K. Dass

Publisher :5th International and 41st National Conference on Fluid Mechanics and Fluid Power,

Publications
Power Generation by High Head Water in a Building using Micro Hydro Turbine

Authors : Balaji K., M. M. S. R. S., B, Dr. Ratna Kishore V., ; Dr. Anbuudayasankar S. P

Publisher :International Conference for Energy and Environment

Admissions Apply Now