Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where A. Kumaravel is active.

Publication


Featured researches published by A. Kumaravel.


international conference on information and communication technologies | 2013

An application of non-uniform cellular automata for efficient cryptography

A. Kumaravel; Oinam Nickson Meetei

One of the core issues for robust cryptographic systems is to deal with the rate of diffusion and distribution of keys. We try to strengthen this aspect by increasing the length of block ciphers. We present a new encryption and decryption algorithm for block cipher that supports 27 bit block size. All components in our system are chosen to be based on cellular automata so as to achieve higher parallelism and to simplify the in hardware and software implementation for applications with high degree of security. The main objective of this paper is to increase the complexity by novel schemes of mixing (reversible cellular automata) RCA and (non-uniform reversible cellular automata) NRCA. We apply set of different bit permutation methods for this purpose .This paper establishes the proof for existence of yet another approach for a high quality pseudorandom bit sequences generated by non uniform cellular automata.


international conference on information and communication technologies | 2013

Multi-classification approach for detecting network attacks

A. Kumaravel; M. Niraisha

Intrusion Detection System (IDS) has increasingly become a crucial issue for computer and network systems. Intrusion poses a serious security risk in a network environment. The ever growing new intrusion types pose a serious problem for their detection. The acceptability and usability of Intrusion Detection Systems get seriously affected with the data in network traffic. A large number of false alarms mean a lot in terms of the acceptability of Intrusion Detection Systems[1].In this paper we consider the dataset with multi classes and propose the classification for each type of attacks in a separate layer. In this work, a multi-classification approach for detecting network attacks is designed and developed to achieve high efficiency and improve the detection and classification rate accuracy [6].


international conference on information and communication technologies | 2013

VehNode: Wireless Sensor Network platform for automobile pollution control

Aijaz Ahmad Reshi; Shabana Shafi; A. Kumaravel

The strength of sensor networks is quite vast when it is applied for collecting physical data in real time and storing for further analysis. The impossible measurements by conventional methods have now become possible by using this technology. Air quality which is one of the most important factors for the sustainable development and is one of the challenging areas researchers dealt with long time. The major source of environment pollution happens to be Vehicular Pollution. The high influx of vehicles to urban areas, and conventional pollution control measures used by concerned agencies has led to the drastic increase of air pollution. Here we address this problem by introducing VehNode, a WSN based Vehicular pollution monitoring platform which is capable of measuring different types of pollutant concentrations contained in smoke produced by the vehicle and reports the status automatically whenever required to the concerned agencies. We assure the existence of Wireless Sensor Network platform for automobile pollution control focusing on an easy accessibility of real time data via the Web by following the Web of Things approach. This will form a basis to connect each vehicle as an entity for a web of things infrastructure enabling the direct interaction with existing web applications of the concerned agencies. The real time data will be available to three main groups of users: Owner of the Vehicle, Traffic department and national environmental agencies.


Indian journal of science and technology | 2015

Survey on Fuzzy Petri Nets for Classification

S. Meher Taj; A. Kumaravel


Indian journal of science and technology | 2013

An Application of Non-uniform Cellular Automata for Efficient Cryptography

A. Kumaravel; Oinam Nickson Meetei


Indian journal of science and technology | 2016

A Novel Approach to Trust based Identification of Leaders in Social Networks

Pallab Dutta; A. Kumaravel


Indian journal of science and technology | 2014

Performance Comparison based on Attribute Selection Tools for Data Mining

M. Sudha; A. Kumaravel


Indian journal of science and technology | 2017

Features Subset Selection using Improved Teaching Learning based Optimisation (ITLBO) Algorithms for Iris Recognition

C. Raghavendra; A. Kumaravel; S. Sivasuramanyan


Research Journal of Applied Sciences, Engineering and Technology | 2015

Measuring Employee Performance Key Indicators by Fuzzy Petri Nets

S. Meher Taj; A. Kumaravel


Indian journal of science and technology | 2015

Theoretical Analysis of Trust-based Routing Schemes for Wireless Sensor Networks

X. Anita; A. Kumaravel

Collaboration


Dive into the A. Kumaravel's collaboration.

Top Co-Authors

Avatar

A. Vinu

Jerusalem College of Engineering

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

X. Anita

Jerusalem College of Engineering

View shared research outputs
Researchain Logo
Decentralizing Knowledge