Zobrazeno 1 - 10
of 93
pro vyhledávání: '"G. Sreenu"'
Autor:
G., Sreenu, M.A., Saleem Durai
Publikováno v:
In Systems and Soft Computing December 2024 6
Autor:
G. Sreenu, M. A. Saleem Durai
Publikováno v:
Journal of Big Data, Vol 6, Iss 1, Pp 1-27 (2019)
Abstract Big data applications are consuming most of the space in industry and research area. Among the widespread examples of big data, the role of video streams from CCTV cameras is equally important as other sources like social media data, sensor
Externí odkaz:
https://doaj.org/article/48b49318239d4ff5b663d346ed4cdc2a
Autor:
G. Sreenu, M. A. Saleem Durai
Publikováno v:
SN Computer Science. 3
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811651564
An image-based virtual try-on system focuses on virtually transferring a clothing item to a given person. In most of the approaches, garment transfer on a target image involves human parsing with pose estimation generating warped cloth, followed by a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a1336d0ad4bf921d00e8bdfd02a3f882
https://doi.org/10.1007/978-981-16-5157-1_66
https://doi.org/10.1007/978-981-16-5157-1_66
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
M.A. Saleem Durai, G. Sreenu
Publikováno v:
Journal of Big Data, Vol 6, Iss 1, Pp 1-27 (2019)
Big data applications are consuming most of the space in industry and research area. Among the widespread examples of big data, the role of video streams from CCTV cameras is equally important as other sources like social media data, sensor data, agr
Publikováno v:
Sustainable Communication Networks and Application ISBN: 9783030345143
Pesticides are used abusively mainly used to control plant diseases and pests, which lead to reduced quality of vegetables and endangering the life of the living beings. So we propose a model that can predict the presence of diseases with the fulfill
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bd4606fa5a26a7d325aee71573aeebde
https://doi.org/10.1007/978-3-030-34515-0_71
https://doi.org/10.1007/978-3-030-34515-0_71
Autor:
G. Sreenu, M.A. Saleem Durai
Advances in recent hardware technology have permitted to document transactions and other pieces of information of everyday life at an express pace. In addition of speed up and storage capacity, real-life perceptions tend to transform over time. Howev
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6ca00428c59d0dba4f08d1fdfd0a951f
https://doi.org/10.4018/978-1-5225-2863-0.ch006
https://doi.org/10.4018/978-1-5225-2863-0.ch006
Publikováno v:
2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).
A cryptographic system uses two dissimilar keys — a public key known to all and a private key known only to the receiver of the message. Encryption of the data uses public key while decryption uses both public and private keys. So in this method al
Autor:
G. Sreenu
Publikováno v:
2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).
P2P (Peer-to-Peer) network has extensive functionality in variety of fields. Accordingly, P2P users share huge amounts of data. The widespread usage of P2P systems can make it a potential truck for worms. The attractiveness of a particular P2P group