A Renuka

602 total citations
45 papers, 370 citations indexed

About

A Renuka is a scholar working on Computer Vision and Pattern Recognition, Computer Networks and Communications and Electrical and Electronic Engineering. According to data from OpenAlex, A Renuka has authored 45 papers receiving a total of 370 indexed citations (citations by other indexed papers that have themselves been cited), including 28 papers in Computer Vision and Pattern Recognition, 9 papers in Computer Networks and Communications and 9 papers in Electrical and Electronic Engineering. Recurrent topics in A Renuka's work include Advanced Steganography and Watermarking Techniques (16 papers), Chaos-based Image/Signal Encryption (14 papers) and Digital Media Forensic Detection (12 papers). A Renuka is often cited by papers focused on Advanced Steganography and Watermarking Techniques (16 papers), Chaos-based Image/Signal Encryption (14 papers) and Digital Media Forensic Detection (12 papers). A Renuka collaborates with scholars based in India, United Kingdom and Singapore. A Renuka's co-authors include U. Dinesh Acharya, Vidya Kamath, U. C. Niranjan, Srikanth Prabhu and Haleh Ashraf and has published in prestigious journals such as IEEE Access, Neurocomputing and Neural Computing and Applications.

In The Last Decade

A Renuka

36 papers receiving 336 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
A Renuka India 10 279 59 33 29 25 45 370
M. Ramkumar India 10 125 0.4× 61 1.0× 26 0.8× 43 1.5× 46 1.8× 37 292
A. Lakshmi India 7 135 0.5× 48 0.8× 66 2.0× 46 1.6× 52 2.1× 25 323
Renu Dhir India 9 165 0.6× 74 1.3× 28 0.8× 21 0.7× 29 1.2× 47 286
Athira Nambiar India 10 279 1.0× 57 1.0× 23 0.7× 15 0.5× 32 1.3× 27 391
N. Krishnaraj India 7 90 0.3× 73 1.2× 57 1.7× 28 1.0× 55 2.2× 12 236
Myasar Mundher Adnan Iraq 9 111 0.4× 71 1.2× 29 0.9× 11 0.4× 15 0.6× 78 258
Parul Sahare India 9 179 0.6× 54 0.9× 37 1.1× 39 1.3× 15 0.6× 19 286
Shivsubramani Krishnamoorthy India 8 115 0.4× 32 0.5× 69 2.1× 34 1.2× 20 0.8× 18 234
Haoliang Sun China 10 156 0.6× 162 2.7× 31 0.9× 10 0.3× 16 0.6× 34 280
Jiaqi Zhang China 7 189 0.7× 118 2.0× 34 1.0× 92 3.2× 14 0.6× 26 296

Countries citing papers authored by A Renuka

Since Specialization
Citations

This map shows the geographic impact of A Renuka's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by A Renuka with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites A Renuka more than expected).

Fields of papers citing papers by A Renuka

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by A Renuka. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by A Renuka. The network helps show where A Renuka may publish in the future.

Co-authorship network of co-authors of A Renuka

This figure shows the co-authorship network connecting the top 25 collaborators of A Renuka. A scholar is included among the top collaborators of A Renuka based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with A Renuka. A Renuka is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Kamath, Vidya & A Renuka. (2025). VireNet-SSD: object detection model for resource-constrained applications based on self-organized operational neural networks. Neural Computing and Applications. 37(14). 8547–8569. 1 indexed citations
3.
Renuka, A, et al.. (2024). Enhancing Order to Cash Processes in SAP Sales and Distribution. 12(1). 108–139. 3 indexed citations
4.
Kamath, Vidya, et al.. (2024). Exploratory Data Preparation and Model Training Process for Raspberry Pi-Based Object Detection Model Deployments. IEEE Access. 12. 45423–45441. 4 indexed citations
5.
Kamath, Vidya & A Renuka. (2024). Investigation of MobileNet-Ssd on human follower robot for stand-alone object detection and tracking using Raspberry Pi. Cogent Engineering. 11(1). 1 indexed citations
6.
Renuka, A, et al.. (2024). Enhancing Vendor Management for Successful IT Project Delivery. 1(2). 370–398. 6 indexed citations
9.
Renuka, A, et al.. (2023). End to End Development and Deployment of Predictive Models Using Azure Synapse Analytics. 9(1). 508–537. 8 indexed citations
10.
Renuka, A, et al.. (2023). A cross-sectional study of prescription audit in outpatient departments of tertiary care hospital. National Journal of Physiology Pharmacy and Pharmacology. 1–1. 2 indexed citations
11.
Renuka, A, et al.. (2023). Leveraging Blue Prism for Scalable Process Automation in Stock Plan Services. 9(5). 216–230. 2 indexed citations
12.
Renuka, A, et al.. (2023). Leveraging AI and Machine Learning in Salesforce for Predictive Analytics and Customer Insights. 10(1). 246–258. 1 indexed citations
14.
Renuka, A, et al.. (2019). Adaptive Receiver-Window Adjustment for Delay Reduction in LTE Networks. Journal of Computer Networks and Communications. 2019. 1–17. 1 indexed citations
15.
Renuka, A, et al.. (2018). Adaptive downlink packet scheduling in LTE networks based on queue monitoring. Wireless Networks. 25(6). 3149–3166. 7 indexed citations
16.
Acharya, U. Dinesh, et al.. (2016). High Capacity Video Steganography Technique in Transform Domain. Pertanika journal of science & technology. 24(2). 411–422. 3 indexed citations
17.
Acharya, U. Dinesh, et al.. (2015). Audio Steganography in Discrete Wavelet Transform Domain. International Journal of Applied Engineering Research. 10(16). 37544–37549. 6 indexed citations
18.
19.
Acharya, U. Dinesh, et al.. (2012). A novel colorImage steganography using Discrete Wavelet Transform. 39. 223–226. 4 indexed citations
20.
Renuka, A, et al.. (2009). Cluster Based Group Key Management in Mobile Ad hoc Networks. 7 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026