Zobrazeno 1 - 10
of 484
pro vyhledávání: '"R Sukumar"'
Autor:
KI, Ravikumar, R, Sukumar
Publikováno v:
In High-Confidence Computing December 2022 2(4)
Autor:
Julie A. Wixey, Kishen R. Sukumar, Rinaldi Pretorius, Kah Meng Lee, Paul B. Colditz, S. Tracey Bjorkman, Kirat K. Chand
Publikováno v:
Frontiers in Physiology, Vol 10 (2019)
Intrauterine growth restriction (IUGR) is a condition where the fetus does not achieve optimal growth, commonly caused by placental insufficiency. The chronic decrease in blood flow restricts oxygen and nutrient supply to the fetus, which can damage
Externí odkaz:
https://doaj.org/article/4c78d036b4314ba29bf783204ed9f75f
Autor:
R. Sukumar, Mohamed Umair
Publikováno v:
INSTRUMENTATION ENGINEERING, ELECTRONICS AND TELECOMMUNICATIONS – 2021 (IEET-2021): Proceedings of the VII International Forum.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
R. A. Begum, R. Lempert, E. Ali, T.A. Benjaminsen, T. Bernauer, W. Cramer, X. Cui, K. Mach, G. Nagy, N.C.Stenseth, R. Sukumar, P. Wester, Prabhakar, Sivapuram Ventaka Rama Krishna
Publikováno v:
Climate Change 2022: Impacts, Adaptation and Vulnerability. :3-77
The IPCC Working Group II contribution to the Sixth Assessment Report addresses the challenges ofclimate action in the context of sustainable development with a particular focus on climate changeimpacts, adaptation and vulnerability.Since IPCC AR5, h
Autor:
Harikrishna Moorthy, R Sukumar
Publikováno v:
2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC).
Publikováno v:
Wireless Personal Communications. 122:3633-3647
With the rapid advancement in the mobile and computing technologies, individuals have an inclination to depend more on them in varied range of situations. For ensuring the secured communication among the devices, privacy and security are the most pro
Autor:
R Sukumar, Rajashree Soman
Publikováno v:
International Journal of Digital Crime and Forensics. 13:65-77
Visitor validation at entrance generates a large number of image files that need to be transmitted over to cloud for future reference. The image data needs to be protected by active and passive adversaries from performing cryptographic attacks on the
Publikováno v:
Journal of Pharmacy and Bioallied Sciences, Vol 7, Iss 5, Pp 125-130 (2015)
Objective: The aim was to evaluate and plan the canine dento alveolar distractions (DADs) with the use of cone-beam computed tomography (CBCT). Materials and Methods: 5 patients are requiring 10 canine DADs were selected for the study. A custom-made
Externí odkaz:
https://doaj.org/article/ce004be2c00a4f9eb96e6864c5a9f3bc
Publikováno v:
Journal of Pharmacy and Bioallied Sciences, Vol 7, Iss 5, Pp 271-275 (2015)
"Beauty is in the mind of the beholder, each mind perceives a different beauty" famously said by writer Margeret Wolfe Hungerford. A beautiful smile is a gateway to the world. The aim of this article was to identify the criteria for designing the per
Externí odkaz:
https://doaj.org/article/15c2754b676c464489efe0e961ba0ecc