Your search returned 4 results.

Sort
Results
Vulnerability analysis and risk mitigation strategies for IoT networks by
  • Gemini George
  • Guided by; Dr. Sabu M Thampi
Publication details: Indian Institute of Information Technology and Management 2019
Availability: Items available for reference: University Library : Not for loan (1)Call number: 004.77 GEM/V T.
Radiometric characterization of common flowers in Kerala, India by
  • Athira, K
  • Guided by Jaishanker, R
Publication details: Thiruvananthapuram Indian institute of Information Technology and Management - Kerala 2020
Availability: Items available for reference: University Library : Not for loan (1)Call number: 550.835-035.27(540.69) ATH/R T.
Adaptive regularization techniques for image reconstruction in accelerated MRI by
  • Raji, Susan Mathew
  • Guided by Joseph Suresh Paul
Publication details: Thiruvananthapuram Indian Institute of Information Technology and Management 2020
Availability: Items available for reference: University Library : Not for loan (1)Call number: 616-073.7 RAJ/A T.
Trusted data management and decision fusion algorithms for building distributed intelligent systems by
  • Jennath H. S
  • Guided by Asharaf S
Publication details: Kochi Faculty of Technology, CUSAT; Indian Institute of Information Technology and Management-Kerala(IIITM-K), Thiruvananthapuram 2022
Availability: Items available for reference: University Library : Not For Loan (1).
Pages
University Library, CUSAT