R. Uma

R. Uma is working as Associate Professor in the Department of Computer Science and Engineering, Sri Sairam Engineering College, Chennai, India. with 23 years of teaching experience for undergraduate and post graduate students in Computer Science Department. She has a Doctorate degree in Computer Science and Engineering from Anna University Chennai, India .She also completed her Master Degree in Computer Science and Engineering from College of Engineering Guindy, Anna University, India and Bachelor Degree from university of Madras. She has published her papers over 14 International Journals. She is a member of CSI,IACSIT and life member of ISTE. Her current research interest includes Information Retrieval, Data Mining, Deep learning and Machine learning .

Publications

Innovative Machine Learning Applications for Cryptography
J. Anitha Ruth, G.V. Mahesh Vijayalakshmi, P. Visalakshi, R. Uma, A. Meenakshi. © 2024. 294 pages.
Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of...
Machine Learning and Cryptographic Solutions for Data Protection and Network Security
J. Anitha Ruth, Vijayalakshmi G. V. Mahesh, P. Visalakshi, R. Uma, A. Meenakshi. © 2024. 420 pages.
In the relentless battle against escalating cyber threats, data security faces a critical challenge – the need for innovative solutions to fortify encryption and decryption...
Prediction Analysis of Natural Disasters Using Machine Learning
P. Ramkumar, R. Uma, D. Satishkumar, J. Anitha Ruth, S. Harikrishna. © 2024. 11 pages.
At present, the entire world has suffered a lot due to natural calamities such as torrential rain flows, earthquakes, tsunamis, storms, as well as global warming. Natural...
An Adaptive Cryptography Using OpenAI API: Dynamic Key Management Using Self Learning AI
R. Valarmathi, R. Uma, P. Ramkumar, Srivatsan Venkatesh. © 2024. 20 pages.
Security functions which are present now, such as the SHA series of hash functions, other brute force prevention protocols, and much more, are keeping our cyber fields safe from...