Follow
Dr Saravavnan Kondappan
Title
Cited by
Cited by
Year
Ear recognition system using adaptive approach Runge–Kutta (AARK) threshold segmentation with ANFIS classification
SB Alagarsamy, S Kondappan
Neural Computing and Applications 32 (15), 10995-11006, 2020
182020
Theoretical survey on secure hash functions and issues
K Saravanan, A Senthilkumar
International Journal of Engineering Research & Technology (IJERT) 2 (10 …, 2013
112013
Security enhancement in distributed networks using link-based mapping scheme for network intrusion detection with enhanced Bloom filter
K Saravanan, A Senthilkumar
Wireless Personal Communications 84, 821-839, 2015
72015
Modified whirlpool hash based bloom filter for networking and security applications
K Saravanan, A Senthilkumar, P Chacko
2014 2nd International Conference on Devices, Circuits and Systems (ICDCS), 1-6, 2014
52014
Anomaly intrusion detection using svm and c4. 5 classification with an improved particle swarm optimization (I-PSO)
V Sandeep, S Kondappan, AA Jone
International Journal of Information Security and Privacy (IJISP) 15 (2 …, 2021
42021
Design and Development of Smart Wheelchair System Using Hand Gesture Control
K Saravanan, V Bharath
2022 6th International Conference on Electronics, Communication and …, 2022
32022
FPGA implementation of secure authentication in WiMAX networks using modified WiMAX bloom filter: A hardware approach
K Saravanan, A Senthilkumar
Journal of Discrete Mathematical Sciences and Cryptography 16 (6), 393-404, 2013
32013
An efficient parallel prefix matching architecture using Bloom filter for multi-bit trie IP lookup algorithm in FPGA
K Saravanan, A Senthilkumar
Optoelectronics and Advanced Materials-Rapid Communications 9 (May-June 2015 …, 2015
22015
Investigation on bloom filter and implementation of 3k combined parallel tiger bloom filter design
K Saravanan, A Senthilkumar
2014 International Conference on Electronics and Communication Systems …, 2014
22014
Hardware based cyber system using high performance crypto hash bloom filter for network security and privacy preserving applications
K Saravanan, SK John, R Cheriyan, A Senthilkumar
A handbook of internet of things in biomedical and cyber physical system, 39-59, 2020
12020
DESIGN OF PRIORITY BASED LOW POWER RECONFIGURABLE ROUTER IN NETWORK ON CHIP
DNP Devadhas
Informacije MIDEM 49 (4), 203-210, 2019
12019
Design and Elevating Cloud Security Through a Comprehensive Integration of Zero Trust Framework
K Saravanan, R Anitha, P Kamarajapandian, TPR Arockiadoss, KS Kumar, ...
International Journal of Intelligent Systems and Applications in Engineering …, 2024
2024
Intelligent Technique for Stress Level Management for IT Employees in the Work from Home Environment using IoT Technology
J Umamageswaran, K Saravanan, VP Srinivasan
Cardiometry, 618-622, 2023
2023
IoT based Chronic Obstructive Pulmonary Lung Disease Patient Management System using Air Quality
K Balasubadra, J Umamageswaran, K Saravanan
Cardiometry, 604-608, 2023
2023
Comparative analysis of low power implementation for AES algorithm in ARTIX 7 FPGA & ASIC
SK Divya P.S Roopa Jayasingh.J,Manoj Pillai
Przeglad Elektrotechniczny 99 (6), 23-26, 2023
2023
Design of Abreast Rectangular Shape Dielectric Resonator Antenna for WLAN Applications
S Subramanian, B Sundarambal, AAA Jone, K Saravanan, B Karthikeyan
2022 6th International Conference on Devices, Circuits and Systems (ICDCS …, 2022
2022
Investigation and survey of a wearable multiband antenna for ISM band applications
L Anil, R Cherian, K Saravanan
2021 International Conference on Disruptive Technologies for Multi …, 2021
2021
SMART DRIVING SYSTEM WITH AUTOMATIC DRIVER ALERT AND BRAKING MECHANISM
PB Dhanusha, A Lakshmi, K Saravanan
3C Tecnologia, 287-298, 2020
2020
Hardware Based Cyber System Using High Performance Crypto Hash Bloom
K Saravanan, SK John, R Cheriyan, A Senthilkumar
A Handbook of Internet of Things in Biomedical and Cyber Physical System 165, 39, 2019
2019
An Insight Review on Bloom Filter and Its Variants with Applications: An Emerging Hash Based Membership Querying Technique
K Saravanan, A Senthilkumar
Journal of Discrete Mathematical Sciences and Cryptography 18 (3), 247-263, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20