关注
Sumathi A C
标题
引用次数
年份
A Case Study on the Reflection of Unemployment: Issues of Graduates and the Remedial Measures
SK Nathan, S Rajamanoharane, A Sumathi
Asian Journal of Research in Social Sciences and Humanities 6 (9), 1118-1125, 2016
12016
A proactive elimination of primary user emulation attack in cognitive radio networks using intense explore algorithm
AC Sumathi, R Vidhyapriya, C Kiruthika
2015 International Conference on Computer Communication and Informatics …, 2015
62015
A study on primary user emulation attack in cognitive radio networks
C Kiruthika, AC Sumathi
International Journal of Science, Engineering and Computer Technology 4 (10 …, 2014
52014
Automatic discovery and recognition of activities in smart environment
L Karthika, AC Sumathi
International Journal of Modern Engineering Research 2 (1), 353-358, 2012
22012
Certain Investigations on Cognitive Radio Based U-LTE Coexistence with Anticipated PUE Attacks
AC Sumathi, R Vidhyapriya
Anna University, 2019
2019
Channel selection strategy for jamming-resistant reactive frequency hopping in Cognitive WiFi network
K Karunambiga, AC Sumathi, M Sundarambal
2015 International Conference on Soft-Computing and Networks Security (ICSNS …, 2015
32015
Data Sensitive Level based Encryption for Protecting Data Stored in Public Cloud
A George, A Sumathi
Asian Journal of Research in Social Sciences and Humanities 7 (3), 1060-1069, 2017
2017
Detection of Malicious Secondary User Using Spectral Correlation Technique in Cognitive Radio Network
ACSDR Vidhyapriya
Australian Journal of Basic and Applied Sciences 9 (5), 185-191, 2015
2015
Development of Functional Prototype of PDCP Sublayer in 5G NR
SA Sumathi A C, Radhakrishna Ganti, Balasiddharth D, ArunPrasath R V
GRENZE International Journal of Engineering and Technology (GIJET) 7 (1 …, 2021
2021
Dr. U. Viswejan, Dr. V. Sowmiya
T Priya, T Ekambaram, MD Chandru, SK Nathan, A Sumathi, TS Raaghav, ...
Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud
A George, A Sumathi
Cluster Computing 22, 1277-1288, 2019
122019
Dynamic bargain game theory in the internet of things for data trustworthiness
AC Sumathi, M Akila, R Pérez de Prado, M Wozniak, PB Divakarachari
Sensors 21 (22), 7611, 2021
502021
Early detection of DDoS attack using integrated SDN-Blockchain architecture for IoT
AC Sumathi, A Ahalawat, A Rameshkumar
2022 International Conference on Innovative Computing, Intelligent …, 2022
32022
Efficient Data Storage and Retrieval in Cloud Environment Using Cuckoo Hashing and Latent Semantic Search
A George, A Sumathi
Middle-East Journal of Scientific Research 23 (6), 1053-1058, 2015
2015
Enhancement of Privacy Preserving Technique using Slicing with Entity Resolution
SR Devi, AC Sumathi
Volume, 0
1
Enhancing 4G co-existence with Wi-Fi/IoT using cognitive radio
AC Sumathi, R Vidhyapriya, C Vivekanandan, AK Sangaiah
Cluster Computing 22 (Suppl 5), 11295-11305, 2019
112019
Health Monitoring System for Pregnant Women
AC Sumathi, P Shayestha, M Umira, S Vinothini
International Journal of P2P Network Trends and Technology (IJPTT) 7 (4), 0
2
Intense Explore Algorithm – A Proactive Way To Eliminate PUE Attacks In Cognitive Radio Networks
ACSDR Vidhyapriya
International Journal of Applied Engineering Research 10 (2), 3827-3842, 2015
4*2015
NEWTR: a multipath routing for next hop destination in internet of things with artificial recurrent neural network (RNN)
AC Sumathi, A Javadpour, P Pinto, AK Sangaiah, W Zhang, ...
International Journal of Machine Learning and Cybernetics 13 (10), 2869-2889, 2022
152022
Pathway Collection below Resource Constraints in Multihop Cognitive Radio Networks
M Vanitha, AC Sumathi
系统目前无法执行此操作,请稍后再试。
文章 1–20