S Smitha Chandran

ORCID: 0000-0003-3880-0516
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Nanoparticles: synthesis and applications
  • Graphene and Nanomaterials Applications
  • Advanced Malware Detection Techniques
  • Medicinal Plants and Neuroprotection
  • Network Security and Intrusion Detection
  • Advanced Nanomaterials in Catalysis
  • Healthcare and Environmental Waste Management
  • Heavy Metals in Plants
  • Heavy metals in environment
  • Digital and Cyber Forensics
  • Pigment Synthesis and Properties
  • Moringa oleifera research and applications
  • Phytochemicals and Medicinal Plants
  • Biological Control of Invasive Species
  • Essential Oils and Antimicrobial Activity
  • Wastewater Treatment and Reuse
  • Constructed Wetlands for Wastewater Treatment
  • Spam and Phishing Detection
  • Nanomaterials for catalytic reactions
  • Advanced Computational Techniques and Applications
  • Impact of Light on Environment and Health
  • Municipal Solid Waste Management
  • Anomaly Detection Techniques and Applications
  • Advanced Chemical Sensor Technologies
  • Advanced Text Analysis Techniques

Amrita Vishwa Vidyapeetham
2016-2025

Australian and New Zealand Intensive Care Society
2021

Bangalore Medical College and Research Institute
2020

Mahatma Gandhi University
2009

Nanotechnology has gained considerable attention in the present century due to its peculiar properties make it as an effective candidate multidisciplinary fields with numerous applications. Nanoparticles displays characteristic chemical and physical like stability, high thermal electrical conductivity, optical catalytic activity. These made them promising material for applications different space applications, industry, photo imaging, therapy, cosmetics medical nano sensors detection of...

10.1016/j.matpr.2020.09.680 article EN cc-by-nc-nd Materials Today Proceedings 2020-11-21

Plant mediated synthesis of nanoparticles is a path breaking approach to fabricate ecologically friendly which can be utilized in various applications. The majority the existing procedures used for rely up on chemical and physical methods, these methods are sometimes harmful potentially dangerous environment living organisms. But green way using plant extract unique, systematic, affordable, environmentally sound method synthesizing with selective specific properties In this article,...

10.1080/24701556.2020.1852254 article EN Inorganic and Nano-Metal Chemistry 2020-12-09

The rapid evolution of IoT environment in medical and industrial applications has led to an increase network vulnerabilities, making intrusion detection system a critical requirement. Existing methods often struggle capturing complex irregular patterns from dynamic data, them not suitable for different applications. To address these limitations, this work proposes STID-Net that integrated customized convolutional kernels spatial feature extraction LSTM layers temporal sequence modelling....

10.3390/s25061852 article EN cc-by Sensors 2025-03-17

Background and objective: Autoverification (AV) of test results in laboratory forms most important transformative step enhancing efficiency, accuracy, workflow the laboratory. plays a critical role by providing framework for adapting emerging technologies like artificial intelligence, machine learning. The key milestones this journey included development customisable rule based systems, integration with LIS alignment quality standards patient safety. Creating validating these rules are...

10.62772/apfcb-news.2025.1.1 article EN 2025-01-01

Significant threats to the environment and human health arise from contamination of heavy metals, especially in urban industrial locations where conventional remediation methods are costly intrusive.Phytoremediation is a sustainable environmentally beneficial method for removing toxic contaminants different environmental compartments. It uses plant’s innate ability absorb, stabilize, detoxify metals. Some plants hyperaccumulators have high capacity sequestering absorbing lead, making them...

10.1051/bioconf/202517203001 article EN cc-by BIO Web of Conferences 2025-01-01

10.61463/ijset.vol.13.issue2.401 article EN International Journal of Science Engineering and Technology 2025-04-15

Among most of the cyber attacks that occured, drastic are advanced persistent threats. APTs differ from other as they have multiple phases, often silent for long period time and launched by adamant, well-funded opponents. These targeted mainly concentrated on government agencies organizations in industries, those involved international trade having sensitive data. escape detection antivirus solutions, intrusion prevention systems firewalls. In this paper we proposes a classification model...

10.1109/icacci.2015.7275911 article EN 2015-08-01

Persistent Organic Pollutants (POPs) are poisonous, environmentally harmful, volatile organic pollutants deposited worldwide due to atmospheric cycling. POPs increasingly gaining attention on a global scale because of their persistence. Humans experience endocrine and reproductive issues cancer as result it. The ecological consequences highlight the interdependence ecosystem need for pollution control protect biodiversity ecosystem's health. While several effective management strategies...

10.1080/02757540.2024.2365164 article EN Chemistry and Ecology 2024-06-13

LoRaWAN is a protocol for wireless communication related to the Internet of Things (IoT), that belongs Low Power Wide Area Network (LPWAN) family. LoRa technology used long distances at low cost power consumption. This able transfer tiny amounts or few bytes data over network effectively regular time interval. Several previous works focus on performance analysis compared security protocol. v1.1 has been significant development definition and some new security-related features improvements....

10.1109/icict48043.2020.9112391 article EN 2022 International Conference on Inventive Computation Technologies (ICICT) 2020-02-01

Anomaly detection refers to the task of estimating and finding patterns which do not comply with general behavior data. Moreover, a range assumptions are made so as differentiate between normal deviated data instances. This paper describes solution approach this problem using two-step phase including an important preprocessing anomaly phase. For phase, we have used two methods mainly: Recursive Feature Elimination method (RFE) Random Forest Ensemble (RF-Ensemble) method. next detection,...

10.1109/icacci.2016.7732226 article EN 2016-09-01

In the rapidly evolving landscape of mobile security, increasing risk posed by Android malware is a paramount concern. The inherent openness system emphasizes critical need for continuous vigilance and strategic alertness. Packed poses significant challenge in detection analysis, as these deliberate techniques complicate traditional security measures, allowing malicious actors to conceal their intent effectively. This research proposes an automated that integrates static dynamic leveraging...

10.1109/isdfs60797.2024.10527328 article EN 2024-04-29
Coming Soon ...