scispace - formally typeset
C

C.R. Suthikshn Kumar

Researcher at Defence Institute of Advanced Technology

Publications -  5
Citations -  68

C.R. Suthikshn Kumar is an academic researcher from Defence Institute of Advanced Technology. The author has contributed to research in topics: Antenna measurement & Patch antenna. The author has an hindex of 2, co-authored 5 publications receiving 57 citations.

Papers
More filters
Journal ArticleDOI

CPW fed hexagonal micro strip fractal antenna for UWB wireless communications

TL;DR: In this article, the hexagonal microstrip fractal antenna (HMSFA) is proposed for ultra wideband wireless communication applications, which is powered through co-planar waveguide (CPW) feed structure.
Proceedings ArticleDOI

Mitigating effects of Black hole Attack in Mobile Ad-Hoc NETworks: Military perspective

TL;DR: This paper proposes a hybrid technique to alleviate the effects of Black hole attack keeping the military perspective in mind and is done using NS-2 simulator.
Journal ArticleDOI

TV white spaces exploration for cognitive radio: taxonomy and research issues

TL;DR: In this article, the inherent methodologies used for TVWS assessment and provides a comprehensive overview of the TVWS regulatory norms, results obtained by TVWS measurement campaigns and field trials conducted worldwide in order to get a statistical knowledge about spectrum availability in a particular geographic region and hence utilized for spectrum management.
Proceedings ArticleDOI

Design of multiresonance loop shape microstrip antenna for ultra wide band wireless communication applications

TL;DR: A novel multiresonance loop shape microstrip antenna (MRLMSA) for ultra wide band wireless communication applications is presented and an optimized MRLMsa is designed and simulated on an Ansoft-HFSS simulation software and a comparative statement of result is also proposed.
Journal ArticleDOI

Classification of malicious process using high‐level activity based dynamic analysis

TL;DR: Experimental results show that the approach supplements the traditional methods toward the improvement of the precision in the overall classification of malicious activity, besides detecting advanced malware which uses obfuscation, polymorphism techniques, etc. for evasion.