A Case Study on the Reflection of Unemployment: Issues of Graduates and the Remedial Measures SK Nathan, S Rajamanoharane, A Sumathi Asian Journal of Research in Social Sciences and Humanities 6 (9), 1118-1125, 2016 | 1 | 2016 |
A proactive elimination of primary user emulation attack in cognitive radio networks using intense explore algorithm AC Sumathi, R Vidhyapriya, C Kiruthika 2015 International Conference on Computer Communication and Informatics …, 2015 | 6 | 2015 |
A study on primary user emulation attack in cognitive radio networks C Kiruthika, AC Sumathi International Journal of Science, Engineering and Computer Technology 4 (10 …, 2014 | 5 | 2014 |
Automatic discovery and recognition of activities in smart environment L Karthika, AC Sumathi International Journal of Modern Engineering Research 2 (1), 353-358, 2012 | 2 | 2012 |
Certain Investigations on Cognitive Radio Based U-LTE Coexistence with Anticipated PUE Attacks AC Sumathi, R Vidhyapriya Anna University, 2019 | | 2019 |
Channel selection strategy for jamming-resistant reactive frequency hopping in Cognitive WiFi network K Karunambiga, AC Sumathi, M Sundarambal 2015 International Conference on Soft-Computing and Networks Security (ICSNS …, 2015 | 3 | 2015 |
Data Sensitive Level based Encryption for Protecting Data Stored in Public Cloud A George, A Sumathi Asian Journal of Research in Social Sciences and Humanities 7 (3), 1060-1069, 2017 | | 2017 |
Detection of Malicious Secondary User Using Spectral Correlation Technique in Cognitive Radio Network ACSDR Vidhyapriya Australian Journal of Basic and Applied Sciences 9 (5), 185-191, 2015 | | 2015 |
Development of Functional Prototype of PDCP Sublayer in 5G NR SA Sumathi A C, Radhakrishna Ganti, Balasiddharth D, ArunPrasath R V GRENZE International Journal of Engineering and Technology (GIJET) 7 (1 …, 2021 | | 2021 |
Dr. U. Viswejan, Dr. V. Sowmiya T Priya, T Ekambaram, MD Chandru, SK Nathan, A Sumathi, TS Raaghav, ... | | |
Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud A George, A Sumathi Cluster Computing 22, 1277-1288, 2019 | 12 | 2019 |
Dynamic bargain game theory in the internet of things for data trustworthiness AC Sumathi, M Akila, R Pérez de Prado, M Wozniak, PB Divakarachari Sensors 21 (22), 7611, 2021 | 50 | 2021 |
Early detection of DDoS attack using integrated SDN-Blockchain architecture for IoT AC Sumathi, A Ahalawat, A Rameshkumar 2022 International Conference on Innovative Computing, Intelligent …, 2022 | 3 | 2022 |
Efficient Data Storage and Retrieval in Cloud Environment Using Cuckoo Hashing and Latent Semantic Search A George, A Sumathi Middle-East Journal of Scientific Research 23 (6), 1053-1058, 2015 | | 2015 |
Enhancement of Privacy Preserving Technique using Slicing with Entity Resolution SR Devi, AC Sumathi Volume, 0 | 1 | |
Enhancing 4G co-existence with Wi-Fi/IoT using cognitive radio AC Sumathi, R Vidhyapriya, C Vivekanandan, AK Sangaiah Cluster Computing 22 (Suppl 5), 11295-11305, 2019 | 11 | 2019 |
Health Monitoring System for Pregnant Women AC Sumathi, P Shayestha, M Umira, S Vinothini International Journal of P2P Network Trends and Technology (IJPTT) 7 (4), 0 | 2 | |
Intense Explore Algorithm – A Proactive Way To Eliminate PUE Attacks In Cognitive Radio Networks ACSDR Vidhyapriya International Journal of Applied Engineering Research 10 (2), 3827-3842, 2015 | 4* | 2015 |
NEWTR: a multipath routing for next hop destination in internet of things with artificial recurrent neural network (RNN) AC Sumathi, A Javadpour, P Pinto, AK Sangaiah, W Zhang, ... International Journal of Machine Learning and Cybernetics 13 (10), 2869-2889, 2022 | 15 | 2022 |
Pathway Collection below Resource Constraints in Multihop Cognitive Radio Networks M Vanitha, AC Sumathi | | |