Back close
Publications
Modified Scaling –Free CORDIC based in place FFT and IFFT architecture for radix-22 algorithm

Authors : Paramasivam C., Jayanthi KB

Publisher : Proceedings on International Conference on Innovations in computer science and Information Technology(ICICSIT)

Publications
Detecting phishing E-mail using machine learning techniques CEN-SecureNLP

Authors : Unnithan, N.A., Harikrishnan, N.B., Vinayakumar, R., Soman, K.P., Sundarakrishna, S.

Publisher : CEUR Workshop Proceedings

Publications
Modified Way Predictive Set-Associative Cache for Energy Efficient Embedded Systems

Authors : Sudarshan, TSB, Biju Raveendran, S Gurunarayanan

Publications
High throughput feed forward pipelined parallel architecture for FFT and IFFT

Authors : Paramasivam C.

Publisher : 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)

Publications
CORDIC Based Pipelined Parallel Architecture for RFFT and RIFFT

Authors : Paramasivam C., Kathir chandrabose K

Publisher : Proceedings on International Conference on Advances in computing, control, communication, automation and structural engineering (ACCCAS-2015)

Publications
Control for transformation of a four wheeled to two wheeled mobile robot

Authors : J.S.Lekshmi, Nandagopal J. L.

Publisher : Materials Today: Proceedings .

Publications
Detecting malicious domain names using deep learning approaches at scale

Authors : Vinayakumar, R., Dr. Soman K. P., Poornachandran, P.

Publisher : Journal of Intelligent and Fuzzy Systems, IOS Press

Publications
Likelihood Ascent-Gibbs Sampling for efficient MIMO detection

Authors : Anil, K.K., Raju, A.K., Snehith, T.C., Dr. Ramanathan R.

Publisher : IEEE International

Publications
Implementation of hyperbolic CORDIC-based VLSI architecture for Kaiser-Bessel window techniques in spectral analysis

Authors : Paramasivam C., Yamunadevi T

Publisher : Proceedings on DRDO Sponsored 2nd IEEE International conference on Innovations in Information, Embedded and Communication Systems(ICIIECE’15)

Publications
Detecting Android malware using Long Short-term Memory (LSTM)

Authors : Vinayakumar, R., Soman, K.P., Poornachandran, P., Sachin Kumar, S.

Publisher : Journal of Intelligent and Fuzzy Systems

Publications
A novel cuckoo search approach to detection in spatially correlated MIMO channels

Authors : Dr. Ramanathan R., Dr. Jayakumar M.

Publisher : Inderscience Publishers (IEL)

Publications
Destroying steganography usage over HTTPS

Authors : Prasath, S.S., Amritha, P.P., Sethumadhavan, M.

Publisher : International Journal of Pure and Applied Mathematics

Admissions Apply Now