The managerial skills in the game of roll ball: an indigenous game of India SK Nathan, A Sumathi, TS Raaghav | | 2024 |
NEWTR: a multipath routing for next hop destination in internet of things with artificial recurrent neural network (RNN) AC Sumathi, A Javadpour, P Pinto, AK Sangaiah, W Zhang, ... International Journal of Machine Learning and Cybernetics 13 (10), 2869-2889, 2022 | 15 | 2022 |
Early detection of DDoS attack using integrated SDN-Blockchain architecture for IoT AC Sumathi, A Ahalawat, A Rameshkumar 2022 International Conference on Innovative Computing, Intelligent …, 2022 | 3 | 2022 |
Separable CNN based Automated Classification of WBCs in Peripheral Blood Stream SAC Karthikeyan S, Tathagat Banerjee, Sathya K NeuroQuantology 20 (8), 394-399, 2022 | | 2022 |
Dynamic bargain game theory in the internet of things for data trustworthiness AC Sumathi, M Akila, R Pérez de Prado, M Wozniak, PB Divakarachari Sensors 21 (22), 7611, 2021 | 50 | 2021 |
Development of Functional Prototype of PDCP Sublayer in 5G NR SA Sumathi A C, Radhakrishna Ganti, Balasiddharth D, ArunPrasath R V GRENZE International Journal of Engineering and Technology (GIJET) 7 (1 …, 2021 | | 2021 |
Enhancing 4G co-existence with Wi-Fi/IoT using cognitive radio AC Sumathi, R Vidhyapriya, C Vivekanandan, AK Sangaiah Cluster Computing 22 (Suppl 5), 11295-11305, 2019 | 11 | 2019 |
Certain Investigations on Cognitive Radio Based U-LTE Coexistence with Anticipated PUE Attacks AC Sumathi, R Vidhyapriya Anna University, 2019 | | 2019 |
Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud A George, A Sumathi Cluster Computing 22, 1277-1288, 2019 | 12 | 2019 |
Study of CR Based U-LTE Co-existence Under Varying Wi-Fi Standards AC Sumathi, M Akila, S Arunkumar Frontier Computing: Theory, Technologies and Applications (FC 2017) 6, 366-375, 2018 | | 2018 |
Data Sensitive Level based Encryption for Protecting Data Stored in Public Cloud A George, A Sumathi Asian Journal of Research in Social Sciences and Humanities 7 (3), 1060-1069, 2017 | | 2017 |
A Case Study on the Reflection of Unemployment: Issues of Graduates and the Remedial Measures SK Nathan, S Rajamanoharane, A Sumathi Asian Journal of Research in Social Sciences and Humanities 6 (9), 1118-1125, 2016 | 1 | 2016 |
Detection of Malicious Secondary User Using Spectral Correlation Technique in Cognitive Radio Network ACSDR Vidhyapriya Australian Journal of Basic and Applied Sciences 9 (5), 185-191, 2015 | | 2015 |
Channel selection strategy for jamming-resistant reactive frequency hopping in Cognitive WiFi network K Karunambiga, AC Sumathi, M Sundarambal 2015 International Conference on Soft-Computing and Networks Security (ICSNS …, 2015 | 3 | 2015 |
A proactive elimination of primary user emulation attack in cognitive radio networks using intense explore algorithm AC Sumathi, R Vidhyapriya, C Kiruthika 2015 International Conference on Computer Communication and Informatics …, 2015 | 6 | 2015 |
Efficient Data Storage and Retrieval in Cloud Environment Using Cuckoo Hashing and Latent Semantic Search A George, A Sumathi Middle-East Journal of Scientific Research 23 (6), 1053-1058, 2015 | | 2015 |
Realization of LBT for Co-existence of U-LTE with Wi-Fi using cognitive radio AC Sumathi, M Priya, R Vidhyapriya International Conference on Innovative Trends in Electronics Communication …, 2015 | 3 | 2015 |
Intense Explore Algorithm – A Proactive Way To Eliminate PUE Attacks In Cognitive Radio Networks ACSDR Vidhyapriya International Journal of Applied Engineering Research 10 (2), 3827-3842, 2015 | 4* | 2015 |
A study on primary user emulation attack in cognitive radio networks C Kiruthika, AC Sumathi International Journal of Science, Engineering and Computer Technology 4 (10 …, 2014 | 5 | 2014 |
Security in cognitive radio networks-a survey AC Sumathi, R Vidhyapriya 2012 12th International Conference on Intelligent Systems Design and …, 2012 | 21 | 2012 |