Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Issue Date
Author
Title
Subject
Help
Sign on to:
My DSpace
Receive email
updates
Edit Profile
Welcome to IR @ NIT Rourkela
Browsing by Author Jena, S K
Jump to:
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
or enter first few letters:
Sort by:
title
issue date
submit date
In order:
Ascending
Descending
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Authors/Record:
All
1
5
10
15
20
25
30
35
40
45
50
Showing results 11 to 30 of 55
< previous
next >
Issue Date
Title
Author(s)
2008
An Efficient Palmimprint Image Recognition System
Panigrahy, S K
;
Jena, D
;
Jena, S K
Feb-2011
Evaluation of Web Application Security Risks and Secure Design Patterns
Dalai, A K
;
Jena, S K
Jul-2010
An Extended Approach to Personalize the Web Search by Measuring the User Relevance
Jena, S K
;
Kumar, V
;
Ashok, S O
Dec-2009
A Fault Model for Testing the Access Control Policies using Classified Mutation Operator
Sharma, S
;
Jena, S K
1982
Free Convection in the Laminar Boundary Layer Flow of a Thermomicropolar Fluid past a Vertical Flat Plate with Suction/Injection
Jena, S K
;
Mathur, M N
2008
A Genetic Algorithm Based Dynamic Load Balancing Scheme for Heterogeneous Distributed Systems
Sahoo, Bibhudatta
;
Mohapatra, Sudipta
;
Jena, S K
2008
Improved Offline Signature Verification Scheme using Feature Point Extraction Method
Jena, D
;
Majhi, B
;
Panigrahy, S K
;
Jena, S K
2008
Improved Offline Signature Verification Scheme using Feature Point Extraction Method
Jena, D
;
Majhi, B
;
Panigrahy, S K
;
Jena, S K
16-Aug-2008
Improved Offline Signature Verification Scheme Using Feature Point Extraction Method
Jena, D
;
Majhi, B
;
Panigrahy, S K
;
Jena, S K
Dec-2009
Improved query plans for unnesting nested SQL queries
Khaitan, P
;
Satish, K M
;
Korra, S B
;
Jena, S K
Dec-2016
Improving Energy Usage in Cloud Computing Using DVFS
Mishra, S K
;
Parida, P P
;
Sahoo, S
;
Sahoo, B
;
Jena, S K
Jun-2014
Intruder Identiļ¬cation in IEEE 802.11 Wireless Infrastructure using Localization
Dalai, A K
;
Jena, S K
Sep-2011
Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad hoc Networks
Singh, Y
;
Jena, S K
2011
Man-in-the-Middle Attack and its Countermeasure in Bluetooth Secure Simple Pairing
Mutchukota, T R
;
Panigrahy, S K
;
Jena, S K
Aug-2011
Man-in-the-Middle Attack and its Countermeasure in Bluetooth Secure Simple Pairing
Muchukota, T R
;
Panigrahy, S K
;
Jena, S K
1984
Mixed convection flow of a micropolar fluid from an isothermal vertical plate
Jena, S K
;
Mathur, M N
2009
Modeling and Analysis to Estimate the Performance of Heterogeneous Cluster
Chandra, Pushpendra Kumar
;
Sahoo, Bibhudatta
;
Jena, S K
Dec-2009
A Modified Remote User Authentication Scheme using Smart Card based on ECDLP
Jena, D
;
Panigrahy, S K
;
Jena, S K
;
Pani, S K
2009
New Approach for Testing the Correctness of Access Control Policies
Sharma, S
;
Jena, S K
;
Korra, S B
Dec-2009
A Novel and Efficient Cryptosystem for Long Message Encryption
Jena, D
;
Panigrahy, S K
;
Jena, S K