Publications

2013
Paul A. DCA: An Approach for Face Recognition through Component Analysis. In: ICACC/ICECCS workshops on computing and communications. Rajagiri School of Engineering and Technology,kakkanad; 2013.
Shamna P, Tripti C, Paul A. DCA: An Approach for Face Recognition through Component Analysis. International Conference on Advances in Computing and Communications (ICACC) 2013. 2013;(May,2013).
John J, Bhawna N, Madhu M. DeBAR : Deflection Based Adaptive Router with Minimal Buffering. In: Proceedings of ACM International Conference on Design, Automation and Test in Europe (DATE-’13). Grenoble, France.: IEEE, ACM; 2013. p. 1583-1588. debar.pdf
Jaison J, Babita RJ. Decision Fusion in in Co-operative Spectrum Sensing: A Fuzzy Based Approach. International Workshop on Recent advances in Computing and Communications (AACW-2013). 2013:23-26.
P.T.Thankachan. Decision Support Tool for Lean Product and Process Development. International Journal of Production Planning & Control. 2013;24(6):449–464.
Panthalookaran V. Defy the gravitational pulls of life. Rajagiri Pallikkutam. 2013;1(4):20-22.
Preetha KG, Priya KG, Khan M. Demand based data replication in MANET. International conference on Advances in Computing & Communications - IEEE Xplore. 2013.
Khan M, G PK. Demand Based Data Replication in MANETs. In: International Conference on Advances in Computing and Communications. IEEE; 2013. demand_based.pdf
paul V. Design of Arm Based Real Time Personnel ModifyingSystem using WiFi Technology. American Journal of Applied Science . 2013;10(8):931- 937.
Ajith V. Pillai, Arun A. Balakrishnan, Rina Anna Simon, Renoh C. Johnson, Padmagireesan S. J. Detection and Localization of Texts from Natural Scene Images Using Scale Space and Morphological Operations. In: International Conference on Circuits, Power and Computing Technologies (ICCPCT 2013). IEEE; 2013. p. 880–885. 06528865.pdf
Mathew A. Different Types of Port-Hopping Methods used to prevent Ddos attacks. International Journal of Computer Science Research & Technology. 2013;1(5).
Nair JR. Digital Control of Permanent Magnet Synchronous Motor. Embedded System Design. 2013.
paul V. Digital Image Steganography using Elliptical Curve Cryptography for secured Data Transmission. In: 2nd International Conference on Applied Sciences and Engineering. ; 2013.
Sreekumar G, Aswathy P, SureshKumar N. DOA Estimation Using Sparse Planar Vector Sensor Array in Shallow Ocean. Proceedings of International Symposium on Ocean Electronics (SYMPOL). 2013.
ECC ENCRYPTION SYSTEM USING  ENCODED MULTIPLIER AND VEDIC  MATHEMATICS
PL B, George D. ECC ENCRYPTION SYSTEM USING ENCODED MULTIPLIER AND VEDIC MATHEMATICS. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering. 2013;VOLUME 2(ISSUE 11, NOVEMBER 2013).Abstract
This paper presents an efficient design and implementation of ECC Encryption System using Encoded Multiplier. ECC algorithm is implemented based on ancient Indian Vedic Mathematics. The speed of the system mainly depends on multipliers and adders. To improve the speed of the system, the multiplier architecture is modified using a new encoded algorithm. Using this algorithm number of partial products in the multiplier architecture is reduced to half and thus it speeds up the operation. Effectively no multipliers are required and number of adders required is reduced drastically. The most significant aspect of this paper is the development of encoded architecture and embedding it in Point Multiplication circuitry of ECC algorithm. The coding is done in Verilog HDL and FPGA implementation using Xilinx Spartan 6 library.
15_ecc_2copies.pdf
Preetha KG, Unnikrishnan A, Jacob P. An Effective Path Protection Method to Attain the Route Stability in MANET. International Journal of Advanced Research in Computer and Communication Engineering . 2013;2(6).
Arumugham-Achari AK, Grifoll J, Rosell-Llompart J. Effects of induced gas flow on electrospray dynamics. In: European Aerosol Conference (EAC 2013). Prague, Czech Republic; 2013.
Efficient Mining of Web Access Patterns using Constrained Self-Organizing Map Clustering. Journal of Network and Innovative Computing,MIR Labs,USA. 2013;Volume 1(2013):154-162.
Adithya Job, Anooj Rohit, B. Suryanarayanan, Prasanth Joseph Panangadan, Arun A. Balakrishnan. An Efficient Tool Identification System Using Principal Component Analysis. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering. 2013;2(6):2636–2641. 70_an_efficient.pdf
Arun" "S. Emergence of Challenge Mechanism in the Light of Existing Secure Routing Scheme in MANET". IJARCCE. 2013;2(6):2406-2409.

Pages