Follow
Dr. T. Madhavi Kumari
Dr. T. Madhavi Kumari
Associate Professor of ECE
Verified email at jntuh.ac.in
Title
Cited by
Cited by
Year
An ASCII value based optimized text data encryption system
R Sultana, TM Kumari
International Journal of Advanced Research in Electrical, Electronics and …, 2016
122016
Iris biometric security using watermarking and visual cryptography
B Swathi, TM Kumari
2017 IEEE International Conference on Power, Control, Signals and …, 2017
32017
ENHANCED ADAPTIVE SECURITY PROTOCOL IN LTE AKA
U Fidelis, M Kumari
International Journal of Computer Science and Mobile Computing 3 (10), 584-594, 2014
22014
Recognition of Offline Hand Written Telugu Script using Deep Learning
TM Kumari, AV Babu
International Journal of Scientific Research in Computer Science …, 2021
12021
Secure Medical Data Encryption Model using Hybrid Algorithms and DWT with CAPTCHA for Authentication
CHN Mrs. T Madhavi Kumari
International Journal of Scientific Research in Engineering and Management 6 …, 2022
2022
Multi-Stage Hiding of Image-into-Audio Steganography using CNN
VVCT Mrs. T Madhavi Kumari, Dr. A. Vinaya Babu
International Journal of Scientific Research in Engineering and Management 6 …, 2022
2022
Image Encryption using MVK Algorithm, El-Gamal and Chaotic Systems
KSG Mrs. T Madhavi Kumari , Dr. A. Vinaya Babu
International Journal of Scientific Research in Engineering and Management 6 …, 2022
2022
A Novel Hybrid Symmetric Key Encryption Algorithm for Telugu Script
TM Kumari, AV Babu
2021
Adaptive Pixel Pair Matching Technique for Data Embedding
N Mounika, TM Kumari
2014
Performance Analysis of 16-QAM Scheme for HSDPA
AH SHAKIR, TM KUMARI
2012
Design prototype of DVB Symbol for Multibank Memory
TS KUMARI, MS KHAN
2012
High Data Rate Operation and BER Performance of OFDM System
YJK NUKHAILAWI, TM KUMARI
2012
A Delay-Aware Data Collection Device Network Structure for Wireless Sensor Networks
YJK NUKHAILAWI, TM KUMARI
2009
Universal Secure Public Key Protocol for Wireless Networks
PK Nallaganchu, MTM Kumari
Secured Data Handling for Wireless Sensor Networks
B Bhavani, TM Kumari
Intelligent Intrusion Detection System Using Deep Learning and Extreme Machine Learning Algorithms
MTM Kumari, AU Karimy
A Comparative Study of Sift and PCA for Content Based Image Retrieval
MTM Kumari
Privacy-Preservation and location proof updation in PBMS networks
CS Sudha, TM Kumari
Secure Adhoc Routing Protocol for Privacy Preservation
SK Neratolla, MTM Kumari
Neural Machine Translation System of Dravidian Languages
TM Kumari, AV Babu
The system can't perform the operation now. Try again later.
Articles 1–20