关注
Sumathi A C
标题
引用次数
年份
The managerial skills in the game of roll ball: an indigenous game of India
SK Nathan, A Sumathi, TS Raaghav
2024
NEWTR: a multipath routing for next hop destination in internet of things with artificial recurrent neural network (RNN)
AC Sumathi, A Javadpour, P Pinto, AK Sangaiah, W Zhang, ...
International Journal of Machine Learning and Cybernetics 13 (10), 2869-2889, 2022
152022
Early detection of DDoS attack using integrated SDN-Blockchain architecture for IoT
AC Sumathi, A Ahalawat, A Rameshkumar
2022 International Conference on Innovative Computing, Intelligent …, 2022
32022
Separable CNN based Automated Classification of WBCs in Peripheral Blood Stream
SAC Karthikeyan S, Tathagat Banerjee, Sathya K
NeuroQuantology 20 (8), 394-399, 2022
2022
Dynamic bargain game theory in the internet of things for data trustworthiness
AC Sumathi, M Akila, R Pérez de Prado, M Wozniak, PB Divakarachari
Sensors 21 (22), 7611, 2021
502021
Development of Functional Prototype of PDCP Sublayer in 5G NR
SA Sumathi A C, Radhakrishna Ganti, Balasiddharth D, ArunPrasath R V
GRENZE International Journal of Engineering and Technology (GIJET) 7 (1 …, 2021
2021
Enhancing 4G co-existence with Wi-Fi/IoT using cognitive radio
AC Sumathi, R Vidhyapriya, C Vivekanandan, AK Sangaiah
Cluster Computing 22 (Suppl 5), 11295-11305, 2019
112019
Certain Investigations on Cognitive Radio Based U-LTE Coexistence with Anticipated PUE Attacks
AC Sumathi, R Vidhyapriya
Anna University, 2019
2019
Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud
A George, A Sumathi
Cluster Computing 22, 1277-1288, 2019
122019
Study of CR Based U-LTE Co-existence Under Varying Wi-Fi Standards
AC Sumathi, M Akila, S Arunkumar
Frontier Computing: Theory, Technologies and Applications (FC 2017) 6, 366-375, 2018
2018
Data Sensitive Level based Encryption for Protecting Data Stored in Public Cloud
A George, A Sumathi
Asian Journal of Research in Social Sciences and Humanities 7 (3), 1060-1069, 2017
2017
A Case Study on the Reflection of Unemployment: Issues of Graduates and the Remedial Measures
SK Nathan, S Rajamanoharane, A Sumathi
Asian Journal of Research in Social Sciences and Humanities 6 (9), 1118-1125, 2016
12016
Detection of Malicious Secondary User Using Spectral Correlation Technique in Cognitive Radio Network
ACSDR Vidhyapriya
Australian Journal of Basic and Applied Sciences 9 (5), 185-191, 2015
2015
Channel selection strategy for jamming-resistant reactive frequency hopping in Cognitive WiFi network
K Karunambiga, AC Sumathi, M Sundarambal
2015 International Conference on Soft-Computing and Networks Security (ICSNS …, 2015
32015
A proactive elimination of primary user emulation attack in cognitive radio networks using intense explore algorithm
AC Sumathi, R Vidhyapriya, C Kiruthika
2015 International Conference on Computer Communication and Informatics …, 2015
62015
Efficient Data Storage and Retrieval in Cloud Environment Using Cuckoo Hashing and Latent Semantic Search
A George, A Sumathi
Middle-East Journal of Scientific Research 23 (6), 1053-1058, 2015
2015
Realization of LBT for Co-existence of U-LTE with Wi-Fi using cognitive radio
AC Sumathi, M Priya, R Vidhyapriya
International Conference on Innovative Trends in Electronics Communication …, 2015
32015
Intense Explore Algorithm – A Proactive Way To Eliminate PUE Attacks In Cognitive Radio Networks
ACSDR Vidhyapriya
International Journal of Applied Engineering Research 10 (2), 3827-3842, 2015
4*2015
A study on primary user emulation attack in cognitive radio networks
C Kiruthika, AC Sumathi
International Journal of Science, Engineering and Computer Technology 4 (10 …, 2014
52014
Security in cognitive radio networks-a survey
AC Sumathi, R Vidhyapriya
2012 12th International Conference on Intelligent Systems Design and …, 2012
212012
系统目前无法执行此操作,请稍后再试。
文章 1–20