Modified minimum connected dominating set formation for wireless Adhoc networks M Yadav, V Rishiwal, G Arora, S Makka arXiv preprint arXiv:0912.4323, 2009 | 5 | 2009 |
A New Approach for Optimization of Program Dependence Graph using Finite Automata S Makka, BB Sagar Indian Journal of Science and Technology, 2016 | 4 | 2016 |
Consequent Formation in Security With Blockchain in Digital Transformation S Makka, G Arora, BB Sagar Research Anthology on Convergence of Blockchain, Internet of Things, and …, 2023 | 2 | 2023 |
IoT based health monitoring and record management using distributed ledger S Makka, G Arora, B Mopuru Journal of Physics: Conference Series 2089 (1), 012030, 2021 | 2 | 2021 |
Impact of Digital Transformation on Security Policies and Standards S Goundar, SB Bhushan, VR Thakare IGI Global, 2019 | 2 | 2019 |
Use of Machine Learning Models for Analyzing the Accuracy of Predicting the Cancerous Diseases S Makka, G Arora, SST Reddy, S Lingam International Conference on Innovations in Data Analytics, 169-180, 2022 | 1 | 2022 |
Study on influence of outliers on the performance of various classification algorithms L Sunitha, S Makka, S Madhu, J Bheemeswara Sastry Innovations in Electronics and Communication Engineering: Proceedings of the …, 2022 | 1 | 2022 |
Performance analysis of a system that identifies the parallel modules through program dependence graph S Makka, B Sagar IJ Intelligent Systems and Applications 9, 37-45, 2017 | 1 | 2017 |
Simulation of a Model for Refactoring Approach for Parallelism Using Parallel Computing Tool Box S Makka, BB Sagar Proceedings of First International Conference on Information and …, 2016 | 1 | 2016 |
The evaluation of abstractive text summarization using deep learning S Makka, S Lingam, SST Reddy, G Arora AIP Conference Proceedings 2938 (1), 2023 | | 2023 |
Application of Blockchain and Internet of Things (IoT) for Ensuring Privacy and Security of Health Records and Medical Services S Makka, K Sreenivasulu, BS Rawat, K Saxena, S Rajasulochana, ... 2022 5th International Conference on Contemporary Computing and Informatics …, 2022 | | 2022 |
Outlier Detection from Mixed Attribute Space Using Hybrid Model L Sunitha, M Bal Raju, S Makka, S Ramasahayam International Conference on Hybrid Intelligent Systems, 940-947, 2022 | | 2022 |
A Vulnerability based Attack Detection and Mitigation in Cloud SaaS Framework. R Saisindhutheja, GK Shyam, S Makka Journal of Engineering Science & Technology Review 15 (5), 2022 | | 2022 |
Wireless Wireless School Security System based on IoT using GSM & Microcontroller | | 2022 |
Jestr r R Saisindhutheja, GK Shyam, S Makka Journal of Engineering Science and Technology Review 15 (5), 158-169, 2022 | | 2022 |
An Efficient Algorithm to multiply ‘n’ matrices on two-dimensional Mesh Network Parallel Architecture GA Shanthi Makka 3rd International Conference on Applied Sciences, Engineering, Technology …, 2022 | | 2022 |
AN EFFICIENT ALGORITHM TO MULTIPLY ‘N’MATRICES ON TWO-DIMENSIONAL MESH NETWORK PARALLEL ARCHITECTURE S Makka, G Arora International Journal of Early Childhood 14 (01), 2204-2214, 2022 | | 2022 |
Role of Blockchain in Banking Sector to Strengthen Security Analysis BBS Shanthi Makka 1st Online International Conference on Rebuilding BHARAT with Artificial …, 2020 | | 2020 |
Communication of Two Controller Area Network Segments through Wireless Sensor Network BBS Shanthi Makka 1st international conference on Networks and Cryptology, 2019 | | 2019 |
Communication of Two Controller Area Network Segments through Wireless Sensor Network BBS Shanthi Makka International Journal of Security and Its Applications (IJSIA) 13 (4), 1-8, 2019 | | 2019 |