A secure triple level encryption method using cryptography and steganography S Usha, GAS Kumar, K Boopathybagan Proceedings of 2011 International Conference on Computer Science and Network …, 2011 | 67 | 2011 |
Evaluation of electromagnetic intrusion in brushless DC motor drive for electric vehicle applications with manifestation of mitigating the electromagnetic interference M Karthik, S Usha, K Venkateswaran, H Panchal, M Suresh, V Priya, ... International Journal of Ambient Energy, 1-8, 2020 | 24 | 2020 |
Effective watermarking algorithm to protect Electronic Patient Record using image transform G Pradeepkumar, S Usha 2013 International Conference on Information Communication and Embedded …, 2013 | 24 | 2013 |
A security model to protect the isolation of medical data in the cloud using hybrid cryptography S Gadde, J Amutharaj, S Usha Journal of Information Security and Applications 73, 103412, 2023 | 19 | 2023 |
Automated sorting and grading of vegetables using image processing S Usha, M Karthik, R Jenifer, PG Scholar International Journal of Engineering Research and General Science 5 (6), 53-61, 2017 | 11 | 2017 |
An intelligent parametric modeling and identification of a 5 kW ballard PEM fuel cell system based on dynamic recurrent networks with delayed context units K Gomathi, M Karthik, S Usha International Journal of Hydrogen Energy 46 (29), 15912-15927, 2021 | 7 | 2021 |
Characterization and experimental validation of a semi-empirical fuel cell model for investigating the water dynamics on the electrical behavior of a 5 kW Ballard stack system … US Karthik Murugesan Journal of Renewable and Sustainable Energy 12 (2), 024301, 2020 | 7 | 2020 |
A new enhanced authentication mechanism using session key agreement protocol S Usha, S Kuppuswami, M Karthik Cybernetics and Information Technologies 18 (4), 61-74, 2018 | 7 | 2018 |
A Biometric Based Secure Session Key Agreement Using Modified Elliptic Curve Cryptography S Usha, S Kuppuswami International Arab Journal of Information Technology 12 (2), 155-162, 2015 | 7* | 2015 |
Performance analysıs of polycystıc ovary syndrome (pcos) detectıon system usıng neural network approach R Boomidevi, S Usha Data Engineering and Communication Technology: Proceedings of ICDECT 2020 …, 2021 | 6 | 2021 |
RETRACTED ARTICLE: A trust based security framework with anonymous authentication system using multiple attributes in decentralized cloud S Usha, A Tamilarasi Cluster Computing 22 (Suppl 2), 3883-3892, 2019 | 6 | 2019 |
Design and development of solar powered unmanned aerial vehicle (UAV) for surveying, mapping and disaster relief M Karthik, S Usha, B Predeep, GR Saran, G Sridhar, R Theeksith AIP Conference Proceedings 2387 (1), 2021 | 5 | 2021 |
Formation of Elliptic Curve using Fingerprint for Network Security S Usha, R Meenakumari, BT Nathan International Conference on Process Automation, Control and Computing, 1-5, 2011 | 5 | 2011 |
Cloud multimedia data security by optimization-assisted cryptographic technique S Gadde, J Amutharaj, S Usha International Journal of Image and Graphics 24 (01), 2450010, 2024 | 4 | 2024 |
A Robust Digital Image Watermarking for Biometric Template Protection Applications S Usha, M Karthik International Journal of Advanced Research in Electrical, Electronics and …, 2015 | 4 | 2015 |
Automatic Turning ON/OFF Bike Indicator Using Offline GPS Navigation System S Usha, M Karthik, R Lalitha, M Jothibasu, T Krishnamoorthy IOP Conference Series: Materials Science and Engineering 1055 (1), 012032, 2021 | 3 | 2021 |
Secured Session Key Agreement Protocol for Iris Cryptosystem Using Customized Elliptic Curve Cryptography S Usha, S Kuppuswami. International Journal of Security and Its Applications 8 (1), 147-158, 2014 | 3 | 2014 |
Comparative study of recurrent and non recurrent neural network based approach for modeling of PEM fuel cell powered electric vehicle K Gomathi, M Karthik, S Usha IOP Conference Series: Materials Science and Engineering 937 (1), 012040, 2020 | 2 | 2020 |
Analysis of Emission and Fuel Economy in a Plug in Hybrid Vehicle Using Various Control Strategies M Karthik, T Nandhakumar, S Usha | 2 | 2016 |
Review Paper on Lightweight Cryptography: Hummingbird on Different Platform TC Thanuja, S Usha International Journal of Art & Humanity Science (IJAHS) 2 (3), 29-33, 2015 | 2 | 2015 |