An ASCII value based optimized text data encryption system R Sultana, TM Kumari International Journal of Advanced Research in Electrical, Electronics and …, 2016 | 12 | 2016 |
Iris biometric security using watermarking and visual cryptography B Swathi, TM Kumari 2017 IEEE International Conference on Power, Control, Signals and …, 2017 | 3 | 2017 |
ENHANCED ADAPTIVE SECURITY PROTOCOL IN LTE AKA U Fidelis, M Kumari International Journal of Computer Science and Mobile Computing 3 (10), 584-594, 2014 | 2 | 2014 |
Recognition of Offline Hand Written Telugu Script using Deep Learning TM Kumari, AV Babu International Journal of Scientific Research in Computer Science …, 2021 | 1 | 2021 |
Secure Medical Data Encryption Model using Hybrid Algorithms and DWT with CAPTCHA for Authentication CHN Mrs. T Madhavi Kumari International Journal of Scientific Research in Engineering and Management 6 …, 2022 | | 2022 |
Multi-Stage Hiding of Image-into-Audio Steganography using CNN VVCT Mrs. T Madhavi Kumari, Dr. A. Vinaya Babu International Journal of Scientific Research in Engineering and Management 6 …, 2022 | | 2022 |
Image Encryption using MVK Algorithm, El-Gamal and Chaotic Systems KSG Mrs. T Madhavi Kumari , Dr. A. Vinaya Babu International Journal of Scientific Research in Engineering and Management 6 …, 2022 | | 2022 |
A Novel Hybrid Symmetric Key Encryption Algorithm for Telugu Script TM Kumari, AV Babu | | 2021 |
Adaptive Pixel Pair Matching Technique for Data Embedding N Mounika, TM Kumari | | 2014 |
Performance Analysis of 16-QAM Scheme for HSDPA AH SHAKIR, TM KUMARI | | 2012 |
Design prototype of DVB Symbol for Multibank Memory TS KUMARI, MS KHAN | | 2012 |
High Data Rate Operation and BER Performance of OFDM System YJK NUKHAILAWI, TM KUMARI | | 2012 |
A Delay-Aware Data Collection Device Network Structure for Wireless Sensor Networks YJK NUKHAILAWI, TM KUMARI | | 2009 |
Universal Secure Public Key Protocol for Wireless Networks PK Nallaganchu, MTM Kumari | | |
Secured Data Handling for Wireless Sensor Networks B Bhavani, TM Kumari | | |
Intelligent Intrusion Detection System Using Deep Learning and Extreme Machine Learning Algorithms MTM Kumari, AU Karimy | | |
A Comparative Study of Sift and PCA for Content Based Image Retrieval MTM Kumari | | |
Privacy-Preservation and location proof updation in PBMS networks CS Sudha, TM Kumari | | |
Secure Adhoc Routing Protocol for Privacy Preservation SK Neratolla, MTM Kumari | | |
Neural Machine Translation System of Dravidian Languages TM Kumari, AV Babu | | |