Follow
S.Usha
S.Usha
Associate Professor, Department of EEE, Kongu Engineering College, Perundurai
Verified email at kongu.ac.in
Title
Cited by
Cited by
Year
A secure triple level encryption method using cryptography and steganography
S Usha, GAS Kumar, K Boopathybagan
Proceedings of 2011 International Conference on Computer Science and Network …, 2011
672011
Evaluation of electromagnetic intrusion in brushless DC motor drive for electric vehicle applications with manifestation of mitigating the electromagnetic interference
M Karthik, S Usha, K Venkateswaran, H Panchal, M Suresh, V Priya, ...
International Journal of Ambient Energy, 1-8, 2020
242020
Effective watermarking algorithm to protect Electronic Patient Record using image transform
G Pradeepkumar, S Usha
2013 International Conference on Information Communication and Embedded …, 2013
242013
A security model to protect the isolation of medical data in the cloud using hybrid cryptography
S Gadde, J Amutharaj, S Usha
Journal of Information Security and Applications 73, 103412, 2023
192023
Automated sorting and grading of vegetables using image processing
S Usha, M Karthik, R Jenifer, PG Scholar
International Journal of Engineering Research and General Science 5 (6), 53-61, 2017
112017
An intelligent parametric modeling and identification of a 5 kW ballard PEM fuel cell system based on dynamic recurrent networks with delayed context units
K Gomathi, M Karthik, S Usha
International Journal of Hydrogen Energy 46 (29), 15912-15927, 2021
72021
Characterization and experimental validation of a semi-empirical fuel cell model for investigating the water dynamics on the electrical behavior of a 5 kW Ballard stack system …
US Karthik Murugesan
Journal of Renewable and Sustainable Energy 12 (2), 024301, 2020
72020
A new enhanced authentication mechanism using session key agreement protocol
S Usha, S Kuppuswami, M Karthik
Cybernetics and Information Technologies 18 (4), 61-74, 2018
72018
A Biometric Based Secure Session Key Agreement Using Modified Elliptic Curve Cryptography
S Usha, S Kuppuswami
International Arab Journal of Information Technology 12 (2), 155-162, 2015
7*2015
Performance analysıs of polycystıc ovary syndrome (pcos) detectıon system usıng neural network approach
R Boomidevi, S Usha
Data Engineering and Communication Technology: Proceedings of ICDECT 2020 …, 2021
62021
RETRACTED ARTICLE: A trust based security framework with anonymous authentication system using multiple attributes in decentralized cloud
S Usha, A Tamilarasi
Cluster Computing 22 (Suppl 2), 3883-3892, 2019
62019
Design and development of solar powered unmanned aerial vehicle (UAV) for surveying, mapping and disaster relief
M Karthik, S Usha, B Predeep, GR Saran, G Sridhar, R Theeksith
AIP Conference Proceedings 2387 (1), 2021
52021
Formation of Elliptic Curve using Fingerprint for Network Security
S Usha, R Meenakumari, BT Nathan
International Conference on Process Automation, Control and Computing, 1-5, 2011
52011
Cloud multimedia data security by optimization-assisted cryptographic technique
S Gadde, J Amutharaj, S Usha
International Journal of Image and Graphics 24 (01), 2450010, 2024
42024
A Robust Digital Image Watermarking for Biometric Template Protection Applications
S Usha, M Karthik
International Journal of Advanced Research in Electrical, Electronics and …, 2015
42015
Automatic Turning ON/OFF Bike Indicator Using Offline GPS Navigation System
S Usha, M Karthik, R Lalitha, M Jothibasu, T Krishnamoorthy
IOP Conference Series: Materials Science and Engineering 1055 (1), 012032, 2021
32021
Secured Session Key Agreement Protocol for Iris Cryptosystem Using Customized Elliptic Curve Cryptography
S Usha, S Kuppuswami.
International Journal of Security and Its Applications 8 (1), 147-158, 2014
32014
Comparative study of recurrent and non recurrent neural network based approach for modeling of PEM fuel cell powered electric vehicle
K Gomathi, M Karthik, S Usha
IOP Conference Series: Materials Science and Engineering 937 (1), 012040, 2020
22020
Analysis of Emission and Fuel Economy in a Plug in Hybrid Vehicle Using Various Control Strategies
M Karthik, T Nandhakumar, S Usha
22016
Review Paper on Lightweight Cryptography: Hummingbird on Different Platform
TC Thanuja, S Usha
International Journal of Art & Humanity Science (IJAHS) 2 (3), 29-33, 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–20