Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of Linear Feedback Shift Register S Rohith, KNH Bhat, AN Sharma 2014 international conference on advances in electronics computers and …, 2014 | 60 | 2014 |
Design of 8 bit Vedic multiplier using Urdhva Tiryagbhyam sutra with modified carry save adder MN Chandrashekara, S Rohith 2019 4th international conference on recent trends on electronics …, 2019 | 28 | 2019 |
Comparative approach for VM scheduling using modified particle swarm optimization and genetic algorithm in cloud computing S Supreeth, K Patil, SD Patil, S Rohith 2022 IEEE International Conference on Data Science and Information System …, 2022 | 26 | 2022 |
An Efficient Policy‐Based Scheduling and Allocation of Virtual Machines in Cloud Computing Environment S Supreeth, K Patil, SD Patil, S Rohith, Y Vishwanath, KSV Prasad Journal of Electrical and Computer Engineering 2022 (1), 5889948, 2022 | 26 | 2022 |
A simple robust digital image watermarking against salt and pepper noise using repetition codes S Rohith, KNH Bhat International Journal on Signal and Image Processing 3 (1), 47-54, 2012 | 21 | 2012 |
Secured wireless network based on a novel dual integrated neural network architecture HV Ramachandra, P Chavan, S Supreeth, HC Ramaprasad, ... Journal of Electrical and Computer Engineering 2023 (1), 9390660, 2023 | 16 | 2023 |
Implementation of high speed and low power 5T-TSPC D flip-flop and its application H Ashwini, S Rohith, KA Sunitha 2016 International Conference on Communication and Signal Processing (ICCSP …, 2016 | 16 | 2016 |
FPGA Implementation of (15, 7) BCH encoder and decoder for text message S Rohith, S Pavithra International Journal of Research in Engineering and Technology 2 (9), 209-214, 2013 | 13 | 2013 |
Image encryption and decryption using key sequence of triple logistic map for medical applications S Rohith, L Jahnavi, SC Bhuvaneshwari, S Supreeth, BK Sujatha 2020 Third International Conference on Advances in Electronics, Computers …, 2020 | 11 | 2020 |
An RNN-Bi LSTM based Multi Decision GAN Approach for the Recognition of Cardiovascular Disease (CVD) from Heart Beat Sound: A Feature Optimization Process NA Vinay, KN Vidyasagar, S Rohith, P Dayananda, S Supreeth, ... IEEE Access, 2024 | 10 | 2024 |
Machine learning model for emotion detection and recognition using an enhanced convolutional neural network B Sowmya, SA Alex, A Kanavalli, S Supreeth, G Shruthi, S Rohith Journal of Integrated Science and Technology 12 (4), 786-786, 2024 | 10 | 2024 |
A secure and robust digital image watermarking scheme using repetition codes for copyright protection S Rohith, KNH Bhat, BK Sujatha 2014 International Conference on Advances in Electronics Computers and …, 2014 | 9 | 2014 |
Image encryption and decryption using combined key sequence of Logistic map and Lozi map S Rohith, BK Sujatha 2015 International Conference on Communications and Signal Processing (ICCSP …, 2015 | 7 | 2015 |
FPGA Implementation of OFDM Transceiver using Verilog-Hardware Description Language N Kumar, HV Kumar International Journal of Computer Applications 975, 8887, 2014 | 7 | 2014 |
Enhanced Hybrid Intrusion Detection System with Attention Mechanism using Deep Learning P Chavan, H Hanumanthappa, EG Satish, S Manoli, S Supreeth, S Rohith, ... SN Computer Science 5 (5), 534, 2024 | 5 | 2024 |
Smart vehicle parking system on fog computing for effective resource management S Kumara, NH Prasad, M Monika, H Tuli, S Supreeth, S Rohith 2023 International Conference on Applied Intelligence and Sustainable …, 2023 | 5 | 2023 |
Two level image encryption scheme using Arnold map and combined key sequence of logistic map and tent map HG Bhaskar, S Rohith, MR Mahesh 2015 Twelfth International Conference on Wireless and Optical Communications …, 2015 | 5 | 2015 |
FPGA Implementation of Park-Miller Algorithm to Generate Sequence of 32-Bit Pseudo Random Key for Encryption and Decryption of Plain Text N Bharatesh, S Rohith International Journal of Reconfigurable and Embedded Systems 2 (3), 99, 2013 | 5 | 2013 |
A novel two stage binary image security system using (2, 2) visual cryptography scheme S Rohith, G Vinay Int J Comput Eng Res 2 (3), 642-646, 2012 | 5 | 2012 |
Design and Development of Walking Monitoring System for Gait Analysis KT Krishnamurthy, S Rohith, GM Basavaraj, S Swathi, S Supreeth International Conference on Multi-disciplinary Trends in Artificial …, 2023 | 4 | 2023 |