ANJANEYULU, N.
158  Ergebnisse:
Personensuche X
?
5

Divalent copper ions-doped strontium magnesium phosphate na..:

Rajendrakumar, A. ; Anjaneyulu, N. Ch. ; Vasu, G...
Journal of Materials Science: Materials in Electronics.  34 (2023)  28 - p. , 2023
 
?
6

Investigation of Anti-inflammatory and Invitro Antioxidant ..:

Kishore, R. N. (R) ; Mangilal, M. (Mangilal) ; Anjaneyulu, N. (N)..
https://www.neliti.com/publications/409154/investigation-of-anti-inflammatory-and-invitro-antioxidant-activities-of-hydroal.  , 2014
 
?
7

An Advanced Signature Scheme Based on Non-abelian Group Ove..:

, In: Advances in Automation, Signal Processing, Instrumentation, and Control; Lecture Notes in Electrical Engineering,
 
?
8

Dynamic Symmetric Key Encryption in Wireless Sensor Network..:

, In: Advances in Automation, Signal Processing, Instrumentation, and Control; Lecture Notes in Electrical Engineering,
 
?
9

Novel Authentication Process of the Smart Cards Using Face ..:

, In: Advances in Automation, Signal Processing, Instrumentation, and Control; Lecture Notes in Electrical Engineering,
Anjaneyulu, G. S. G. N. ; Jalaja, V. - p. 2547-2556 , 2021
 
?
10

Robust and Novel Dynamic Password Using SVD and Linear Syst..:

, In: Advances in Automation, Signal Processing, Instrumentation, and Control; Lecture Notes in Electrical Engineering,
Anjaneyulu, G. S. G. N. ; Singh, Karan - p. 2579-2592 , 2021
 
?
11

Dimensionality Reduction and Vegetation Monitoring On LISS ..:

, In: 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE),
 
?
12

Secured Cryptosystem for Key Exchange:

, In: 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC),
 
?
13

Palm fruit harvester algorithm for elaeis guineensis oil pa..:

, In: 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC),
 
?
14

Special super edge-magic sequences on (q+ 1,q) and (q,q) gr..:

Anjaneyulu, G. S. G. N. ; Vijayabarathi, A.
Journal of Discrete Mathematical Sciences and Cryptography.  16 (2013)  6 - p. 349-365 , 2013
 
1-15