Follow
Dr.Narayanasamy P
Dr.Narayanasamy P
Verified email at auist.net
Title
Cited by
Cited by
Year
Distributed location and trust based replica detection in wireless sensor networks
G Amudha, P Narayanasamy
Wireless Personal Communications 102, 3303-3321, 2018
872018
Attention-based C-BiLSTM for fake news detection
TE Trueman, A Kumar, P Narayanasamy, J Vidya
Applied Soft Computing 110, 107600, 2021
562021
Trust-based evolutionary game model assisting AODV routing against selfishness
K Komathy, P Narayanasamy
Journal of Network and Computer Applications 31 (4), 446-471, 2008
562008
Multipath power sensitive routing protocol for mobile ad hoc networks
AP Subramanian, AJ Anto, J Vasudevan, P Narayanasamy
IFIP Working Conference on Wireless On-Demand Network Systems, 171-183, 2004
522004
Multiple molecular sequence alignment by island parallel genetic algorithm
LA Anbarasu, P Narayanasamy, V Sundararajan
Current Science, 858-863, 2000
502000
Analyzing the network performance of various replica detection algorithms in wireless sensor network
A Gunasekaran, P Narayanasamy
Journal of Computational and Theoretical Nanoscience 15 (3), 989-994, 2018
362018
Multiple sequence alignment using parallel genetic algorithms
LA Anbarasu, P Narayanasamy, V Sundararajan
Asia-Pacific Conference on Simulated Evolution and Learning, 130-137, 1998
321998
Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network
K Komathy, P Narayanasamy
Computer Communications 30 (18), 3721-3735, 2007
292007
Study of co-operation among selfish neighbors in manet under evolutionary game theoretic model
K Komathy, P Narayanasamy
2007 International Conference on Signal Processing, Communications and …, 2007
232007
SMIRT with Call Admission Control (CAC) based vertical handover decision for seamless mobility in multi-access 4G heterogeneous wireless overlay networks
P Vetrivelan, P Narayanasamy
IMECS, Hong Kong, 2012
182012
The Model—Dynamic and flexible intrusion detection protocol for high error rate wireless sensor networks based on data flow
S Janakiraman, S Rajasoundaran, P Narayanasamy
2012 International Conference on Computing, Communication and Applications, 1-6, 2012
182012
Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS
G Kousalya, P Narayanasamy, JH Park, T Kim
Computer Communications 31 (12), 2781-2789, 2008
172008
A probabilistic behavioral model for selfish neighbors in a wireless ad hoc network
K Komathy, P Narayanasamy
IJCSNS 7 (7), 77, 2007
172007
Cooperative and feedback based authentic routing protocol for energy efficient IoT systems
A Gayathri, AV Prabu, S Rajasoundaran, S Routray, P Narayanasamy, ...
Concurrency and Computation: Practice and Experience 34 (11), e6886, 2022
152022
Mobile sink based reliable and energy efficient data gathering technique for WSN
P Madhumathy, D Sivakumar, NKS PUTRI, A HUDIARTO, ...
Journal of theoretical and applied information technology 61 (1), 1-9, 2014
142014
Secure data forwarding against denial of service attack using trust based evolutionary game
K Komathy, P Narayanasamy
VTC Spring 2008-IEEE Vehicular Technology Conference, 31-35, 2008
142008
Exchange rate and market microstructure in brazil
O De Medeiros, V Mariappan, P Narayanasamy
Academic Open Internet Journal 14, 2005
112005
Ensuring privacy and data freshness for public auditing of shared data in cloud
TE Trueman, P Narayanasamy
2015 IEEE International Conference on Cloud Computing in Emerging Markets …, 2015
92015
Test suite reduction using HGS based heuristic approach
A Gladston, HK Nehemiah, P Narayanasamy, A Kannan
Computing and Informatics 34 (5), 1113-1132, 2015
92015
A graph-based method for ranking of cloud service providers
TE Trueman, P Narayanasamy, J Ashok Kumar
The Journal of Supercomputing 78 (5), 7260-7277, 2022
82022
The system can't perform the operation now. Try again later.
Articles 1–20