A novel secure hash algorithm for public key digital signature schemes. T Lakshmanan, M Madheswaran Int. Arab J. Inf. Technol. 9 (3), 262-267, 2012 | 47 | 2012 |
A single chip design and implementation of aes-128/192/256 encryption algorithms L Thulasimani, M Madheswaran International Journal of Engineering Science and Technology 2 (5), 1052-1059, 2010 | 41 | 2010 |
Security and robustness enhancement of existing Hash algorithm T Lakshmanan, M Madheswaran 2009 International Conference on Signal Processing Systems, 253-257, 2009 | 22 | 2009 |
Analysis of spectrum sensing data falsification (SSDF) attack in cognitive radio networks: a survey AHS Magdalene, L Thulasimani J. Sci. Eng. Educ 2, 2017 | 10 | 2017 |
Real time driver drowsiness detection using opencv and facial landmarks L Thulasimani, P SP Int. J. of Aquatic Science 12 (2), 4297-4314, 2021 | 9 | 2021 |
Secure Beamforming in 5G-Based Cognitive Radio Network TLH SharonMagdalene Symmetry 2019 11 (10), 1260, 2019 | 6* | 2019 |
Design and implementation of reconfigurable rijndael encryption algorithms for reconfigurable mobile terminals L Thulasimani, M Madheswaran International Journal on Computer Science and Engineering 2 (4), 1003-1011, 2010 | 6 | 2010 |
Implementation of an energy efficient reconfigurable authentication unit for software radio L Thulasimani, M Madheswaran International Journal on Computer Science and Engineering 2 (04), 1375-1380, 2010 | 3 | 2010 |
Fuzzy Clustering Means (FCM) for mitigating Spectrum sensing data falsification (SSDF) attack in Cognitive Radio Networks ‘ AHS Dr. L. Thulasimani,Magdalene IEEE International Conference on Computational Intelligence and Computing …, 2017 | 2* | 2017 |
Text dependent speech based biometric for mobile security L Thulasimani International Journal of Computer Applications 51 (17), 2012 | 2 | 2012 |
Analyzing Beamforming for Secure Transmission of MIMO-NOMA-Based CRN using Power Allocation Based on Second-Order Perturbation L Thulasimani, A Hylis Sharon Magdalene International Conference on Advances in Electrical and Computer Technologies …, 2021 | 1 | 2021 |
Implementation of 1. 5 GHz Current Reusing Low Noise Amplifier for Ultra Narrow Band Applications L Thulasimani AASCIT Communications 2 (3), 69-73, 2015 | 1 | 2015 |
Design and Performance Analysis of Unified Reconfigurable Data Integrity Unit for Mobile Terminals LTM Madheswaran International Journal of Computer Science and Information Security 7 (2 …, 2010 | 1* | 2010 |
A Novel Second-Order Perturbation Technique for Improving the Signal Processing in MIMO-NOMA Based Cognitive Radio Networks AHS Magdalene, L Thulasimani Wireless Personal Communications, 1-22, 2022 | | 2022 |
Lessening Spectrum Sensing Data Falsification Attack by Weighted Fuzzy Clustering Means Using Simulation Annealing in Cognitive Radio Networks L Thulasimani, A Hyils Sharon Magdalene International Conference on Advances in Electrical and Computer Technologies …, 2021 | | 2021 |
Performance Analysis of Spectrum and Energy Efficiency in Millimeter-Wave Massive MIMO-NOMA and MIMO-OM GR L.Thulasimani*1 International Journal of Scientific Research in Science and Technology 9 (1), 10, 2021 | | 2021 |
Power Optimization for Spectrum Sharing in Vehicular Networks AASD L. Thulasimani International Journal of Innovative Technology and Exploring Engineering …, 2021 | | 2021 |
Design of Air Quality Analysis Monitoring Using LoRaMOTE Developing Module Dr. L. Thulasimani , S. Sangeetha Mary International Journal of Science and Research (IJSR 10 (3), 4, 2021 | | 2021 |
Design of Circular Fractal Antenna with Tunable Radiation Pattern for Multiband Frequencies L Thulasimani International Journal of Applied Engineering Research 16 (4), 239-241, 2021 | | 2021 |
A Novel Method for Securing Cognitive Radio Communication Network Using the Machine Learning Schemes and a Rule Based Approaches AHS Magdalene, L Thulasimani Artificial Intelligence Trends for Data Analytics Using Machine Learning and …, 2020 | | 2020 |