default search action
V. Sumathy
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]R. Subathra, V. Sumathy:
An offbeat bolstered swarm integrated ensemble learning (BSEL) model for heart disease diagnosis and classification. Appl. Soft Comput. 154: 111273 (2024) - [j17]Sakthivel Periyamuthaiah, Sumathy Vembu:
Optimal interference mitigation with deep learningbased channel access in wireless body area networks. Int. J. Commun. Syst. 37(15) (2024) - 2023
- [j16]S. Periyanayagi, V. Nandini, K. Basarikodi, V. Sumathy:
IOT Assisted Biomedical Monitoring Sensors for Healthcare in Human. Comput. Syst. Sci. Eng. 45(3): 2853-2868 (2023) - [c6]C. Harshini, J. Vishal Ananth, B. Abdul Rahman Arshad Ahmad, C. K. Thejeswari, V. Sumathy:
DAPP IT - Multipurpose ID Card System for Universities. ICCIDS 2023: 34-49 - 2022
- [j15]Chinnadurai Thiripurasundari, M. Mahadevi, V. Sumathy, C. Thiruvengadam:
Design of a compact T-shaped slot antenna for wireless applications. Int. J. Commun. Syst. 35(2) (2022) - [j14]S. Periyanayagi, G. Gnana Priya, T. Chandrasekar, V. Sumathy, S. P. Raja:
Artificial intelligence and IoT-based biomedical sensors for intelligent cattle husbandry systems. Int. J. Wavelets Multiresolution Inf. Process. 20(6): 2250026:1-2250026:21 (2022) - 2020
- [j13]Venugopalan Kiruthika, Sumathy Vembu:
Dynamic handover algorithm with interference cancellation in 5G networks for emergency communication. Int. J. Commun. Syst. 33(4) (2020) - [j12]S. Periyanayagi, A. Azhagu Jaisudhan Pazhani, V. Sumathy:
Enhanced humanoid assisted human interaction model based on linear structural modeling for knowledge representation. J. Ambient Intell. Humaniz. Comput. 11(12): 6307-6318 (2020)
2010 – 2019
- 2018
- [j11]Chinnadurai Thiripurasundari, V. Sumathy, C. Thiruvengadam:
An FPGA implementation of novel smart antenna algorithm in tracking systems for smart cities. Comput. Electr. Eng. 65: 59-66 (2018) - [j10]J. Athena, V. Sumathy, K. Kumar:
An identity attribute-based encryption using elliptic curve digital signature for patient health record maintenance. Int. J. Commun. Syst. 31(2) (2018) - [j9]M. Kiruba, V. Sumathy:
Register Pre-Allocation based Folded Discrete Tchebichef Transformation Technique for Image Compression. Integr. 60: 13-24 (2018) - [j8]S. Periyanayagi, V. Sumathy:
Swarm-based defense technique for tampering and cheating attack in WSN using CPHS. Pers. Ubiquitous Comput. 22(5-6): 1165-1179 (2018) - 2017
- [j7]Chinnadurai Thiripurasundari, Vembu Sumathy:
FPGA realisation-based architecture for direction-of-arrival in wireless communication. Int. J. Netw. Virtual Organisations 17(2/3): 137-148 (2017) - [j6]M. Kiruba, V. Sumathy:
A Novel HBE-MCM-Based Multiplier Architecture for 8-Point DCT Structure. J. Circuits Syst. Comput. 26(4): 1750054:1-1750054:22 (2017) - 2015
- [j5]E. Prince Edward, V. Sumathy:
Performance analysis of a context aware cross layer scheme for fast handoff in IMS based integrated WiFi-WiMax networks. Pervasive Mob. Comput. 17: 79-101 (2015) - 2014
- [j4]N. Suganthi, Sumathy Vembu:
Energy Efficient Key Management Scheme for Wireless Sensor Networks. Int. J. Comput. Commun. Control 9(1): 71-78 (2014) - [j3]Nafeesa Begum Jeddy, Krishnan Kumar, Vembu Sumathy:
Hierarchical Access control in Dynamic Peer Groups using Symmetric Polynomial and Tree based Group Elliptic Curve Diffie Hellman Scheme. J. Comput. Sci. 10(9): 1650-1665 (2014) - 2011
- [c5]Krishnan Kumar, J. Nafeesa Begum, V. Sumathy:
Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography. ADCONS 2011: 505-514 - 2010
- [j2]Krishnan Kumar, J. Nafeesa Begum, V. Sumathy:
A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography. Int. J. Commun. Netw. Syst. Sci. 3(4): 369-379 (2010) - [j1]J. Nafeesa Begum, Krishnan Kumar, Vembu Sumathy:
Design and Implementation of Multilevel Access Control in Synchronized Audio to Audio Steganography Using Symmetric Polynomial Scheme. J. Information Security 1(1): 29-40 (2010) - [c4]Krishnan Kumar, J. Nafeesa Begum, V. Sumathy:
Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc Networks. CNSA 2010: 280-295 - [c3]Krishnan Kumar, J. Nafeesa Begum, V. Sumathy:
A Secure Ubiquitous Computing Approach for Serving Elderly Citizens. UKSim 2010: 653-658 - [i3]J. Nafeesa Begum, Krishnan Kumar, V. Sumathy:
Design And Implementation Of Multilevel Access Control In Medical Image Transmission Using Symmetric Polynomial Based Audio Steganography. CoRR abs/1004.1682 (2010) - [i2]Krishnan Kumar, J. Nafeesa Begum, V. Sumathy:
A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Secure Group Communication. CoRR abs/1007.0087 (2010) - [i1]Krishnan Kumar, J. Nafeesa Begum, V. Sumathy:
A Novel Approach Towards Cost Effective Region-Based Group Key Agreement Protocol for Peer - to - Peer Information Sharing in Mobile Ad Hoc Networks. CoRR abs/1011.0363 (2010)
2000 – 2009
- 2009
- [c2]Krishnan Kumar, J. Nafeesa Begum, V. Sumathy:
A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks. CICSyN 2009: 470-475 - 2008
- [c1]E. Prince Edward, V. Sumathy:
Enhanced SIP based method for vertical handoff between WiFi and WiMax networks. ICON 2008: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint