A comparative study of redundant constraints identification methods in linear programming problems S Paulraj, P Sumathi Mathematical Problems in Engineering 2010, 2010 | 94 | 2010 |
Intrusion detection systems: A survey and analysis of classification techniques V Jaiganesh, S Mangayarkarasi, P Sumathi International Journal of Advanced Research in Computer and Communication …, 2013 | 81 | 2013 |
Novel pre-processing technique for web log mining by removing global noise and web robots P Nithya, P Sumathi 2012 National Conference on Computing and Communication Systems, 1-5, 2012 | 45 | 2012 |
A new approach to solve linear programming problem with intercept values P Sumathi Journal of Information and Optimization Sciences 37 (4), 495-510, 2016 | 44 | 2016 |
An analysis of intrusion detection system using back propagation neural network V Jaiganesh, P Sumathi, S Mangayarkarasi 2013 international conference on information communication and embedded …, 2013 | 44 | 2013 |
Local clustering and threshold sensitive routing algorithm for wireless sensor networks RA Roseline, P Sumathi 2012 International Conference on Devices, Circuits and Systems (ICDCS), 365-369, 2012 | 43 | 2012 |
Energy Efficient Routing Protocols and Algorithms for Wireless Sensor Networks–A Survey RA Roseline, P Sumathi Global Journal of Computer Science and Technology 11 (21), 61-67, 2011 | 41 | 2011 |
An efficient clustering algorithm based on z-score ranking method V Kathiresan, P Sumathi 2012 International Conference on Computer Communication and Informatics, 1-4, 2012 | 35 | 2012 |
Pollution monitoring using sensors and wireless sensor networks: A survey RA Roseline, M Devapriya, P Sumathi International Journal of Application or Innovation in Engineering …, 2013 | 30 | 2013 |
Retracted: Soil monitoring and evaluation system using EDL‐ASQE: Enhanced deep learning model for IoT smart agriculture network P Sumathi, R Subramanian, VV Karthikeyan, S Karthik International Journal of Communication Systems 34 (11), e4859, 2021 | 24 | 2021 |
A new clustering and preprocessing for web log mining BU Maheswari, P Sumathi 2014 World Congress on Computing and Communication Technologies, 25-29, 2014 | 22 | 2014 |
Identification of redundant constraints in large scale linear programming problems with minimal computational effort P Sumathi, S Paulraj Applied Mathematical Sciences 7 (80), 3963-3974, 2013 | 22 | 2013 |
Enhanced firefly algorithm (EFA) based gene selection and adaptive neuro neutrosophic inference system (ANNIS) prediction model for detection of circulating tumor cells (CTCs … TS Umamaheswari, P Sumathi Cluster Computing 22, 14035-14047, 2019 | 21 | 2019 |
An efficient algorithm for network intrusion detection system V Jaiganesh, S Mangayarkarasi, P Sumathi International Journal of Computer Applications 90 (12), 2014 | 17 | 2014 |
A survey on Web usage mining: theory and applications P Nithya, P Sumathi International Journal of Computer Technology and Applications 3 (4), 2012 | 15 | 2012 |
New approach to solve fuzzy linear programming problems by the ranking function A Karpagam, P Sumathi Bonfring International Journal of Data Mining 4 (4), 22-25, 2014 | 14 | 2014 |
An enhanced pre-processing technique for web log mining by removing web robots P Nithya, P Sumathi 2012 IEEE International Conference on Computational Intelligence and …, 2012 | 14 | 2012 |
Improved Soil Quality Prediction Model Using Deep Learning for Smart Agriculture Systems. P Sumathi, VV Karthikeyan, MS Kavitha, S Karthik Comput. Syst. Sci. Eng. 45 (2), 1545-1559, 2023 | 13 | 2023 |
Enhanced energy efficient multipath routing protocol for wireless sensor communication networks using cuckoo search algorithm DAA Raj, P Sumathi Wireless Sensor Network 6 (04), 49, 2014 | 13 | 2014 |
A new approach for selecting a constraint in linear programming problems to identify the redundant Constraints S Paulraj, P Sumathi International Journal of Scientific and Engineering Research 3 (3), 2012 | 13 | 2012 |