R. Uma

|R. Uma - Editor|N/A

Publications

Innovative Machine Learning Applications for Cryptography
J. Anitha Ruth, G.V. Mahesh Vijayalakshmi, P. Visalakshi, R. Uma, A. Meenakshi. © 2024. 294 pages.
Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of...
Machine Learning and Cryptographic Solutions for Data Protection and Network Security
J. Anitha Ruth, Vijayalakshmi G. V. Mahesh, P. Visalakshi, R. Uma, A. Meenakshi. © 2024. 526 pages.
In the relentless battle against escalating cyber threats, data security faces a critical challenge – the need for innovative solutions to fortify encryption and decryption...
Prediction Analysis of Natural Disasters Using Machine Learning
P. Ramkumar, R. Uma, D. Satishkumar, J. Anitha Ruth, S. Harikrishna. © 2024. 11 pages.
At present, the entire world has suffered a lot due to natural calamities such as torrential rain flows, earthquakes, tsunamis, storms, as well as global warming. Natural...
An Adaptive Cryptography Using OpenAI API: Dynamic Key Management Using Self Learning AI
R. Valarmathi, R. Uma, P. Ramkumar, Srivatsan Venkatesh. © 2024. 20 pages.
Security functions which are present now, such as the SHA series of hash functions, other brute force prevention protocols, and much more, are keeping our cyber fields safe from...
Secure Data Transmission in the WSN Sector Utilizing a Heuristic Multi-Level Clustering Mechanism With Dynamic Trust Computation
Uma R., P. Ramkumar, J. Anitha Ruth, R. Valarmathi, C. Vinola. © 2024. 9 pages.
Wireless sensor networks (WSNs) utilize a network of small sensor nodes to collect, process, and report observed data back to a central location. A multi-trust paradigm based on...
A Smart Anomaly Detection Method in Cyber Physical Systems Using Machine Learning
P. Ramkumar, B. Shadaksharappa, R. Uma, J. Anitha Ruth, R. Valarmathi. © 2024. 10 pages.
Cyber-Physical systems (CPS) are recognized by a broad range of complicated multi-tasking fixings with good interaction which results in combining cyber areas within the actual...
Intrusion Detection System in Mobile Networks
P. Ramkumar, E. Saravanakumar, R. Uma, V. Mareeswari, Naveen H. S.. © 2024. 11 pages.
A mobile network is a systematic collection of mobile nodes that process information with one another without the help of another mounted vital arranger. In common usage, a node...
Forging an Ethical Paradigm With Moral Integrity in the Realm of Crypto Currency Investment
Valarmathi R., V. K. G. Kalaiselvi, G. Jagadeesh, R. Uma, P. Ramkumar. © 2024. 19 pages.
The integration of AIML in cryptocurrency trading raises ethical concerns, demanding a thorough examination of accountable approaches. This research focuses on evaluating the...
Early Prediction of Cardiac Arrest Using Data Mining Algorithms
P. Ramkumar, R. Uma, D. Sivakumar, J. Anitha Ruth. © 2024. 13 pages.
Cardiac arrest is a potentially fatal loss of heart function that occurs suddenly and without warning. Predicting cardiac arrest early could increase the likelihood of survival...
COVID-19 Contamination Extraction From CT Images Using an Adaptive Network
Poonguzhali Arunachalam, P. Ramkumar, R. Uma, J. Anitha Ruth. © 2024. 30 pages.
The COVID-19 pandemic is one of the most significant threats to the general population's health in the 21st century. In this study, a novel meta-learning based FSS model is...