Zobrazeno 1 - 10
of 518
pro vyhledávání: '"K. P. Soman"'
Publikováno v:
IEEE Access, Vol 12, Pp 20064-20090 (2024)
Recently, the emergence of social media has opened the way for online harassment in the form of hate speech and offensive language. An automated approach is needed to detect hate and offensive content from social media, which is indispensable. This t
Externí odkaz:
https://doaj.org/article/1f85245548bd4958831f4aeed6ae1e12
Autor:
Neethu Mohan, S. Sachin Kumar, K. P. Soman, V. G. Sujadevi, Prabaharan Poornachandran, U. Rajendra Acharya
Publikováno v:
IEEE Access, Vol 11, Pp 39228-39242 (2023)
The voltage fluctuations are caused by variations in renewable energy source outputs, increased usage of nonlinear loads, high reactive power consumption of loads, etc. This results in damage to electric components and enormous economic losses. It is
Externí odkaz:
https://doaj.org/article/60a6bb2c1e584316a81dc711a48d1e75
Publikováno v:
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol XLVI-M-2-2022, Pp 91-96 (2022)
Deep learning (DL) algorithms are widely used in object detection such as roads, vehicles, buildings, etc., in aerial images. However, the object detection task is still considered challenging for detecting complex structures, oil pads are one such e
Externí odkaz:
https://doaj.org/article/7a2f89e5581440ee9cfcb6b054eb0ea7
Publikováno v:
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol XLVI-M-2-2022, Pp 159-163 (2022)
Dense Residual U-Net (DRU-Net) is a neural network used for image segmentation. It is based on the U-Net architecture and isa combination of modified ResNet as the encoder and modified DenseNet as the decoder blocks. DRU-Net captures both the local a
Externí odkaz:
https://doaj.org/article/51c2e5d329184d16888eecb60fd55aff
Publikováno v:
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol XLIV-M-3-2021, Pp 149-153 (2021)
The deep learning (DL) models require timely updates to continue their reliability and robustness in prediction, classification, and segmentation tasks. When the deep learning models are tested with a limited test set, the model will not reveal the d
Externí odkaz:
https://doaj.org/article/c8e2ea9122a34efb994ae20af67fc75d
Publikováno v:
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol XLIV-M-3-2021, Pp 155-161 (2021)
Deep learning (DL) methods are used for identifying objects in aerial and ground-based images. Detecting vehicles, roads, buildings, and crops are examples of object identification applications using DL methods. Identifying complex natural and man-ma
Externí odkaz:
https://doaj.org/article/89ebd7b3c401490c9087e5ea3c54f754
Publikováno v:
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol XLIV-M-2-2020, Pp 99-104 (2020)
Unmanned Aerial Vehicle (UAV) missions often collect large volumes of imagery data. However, not all images will have useful information, or be of sufficient quality. Manually sorting these images and selecting useful data are both time consuming and
Externí odkaz:
https://doaj.org/article/1b7eed3fa28849369292d3946b2cc52e
Autor:
R. Vinayakumar, Mamoun Alazab, K. P. Soman, Prabaharan Poornachandran, Sitalakshmi Venkatraman
Publikováno v:
IEEE Access, Vol 7, Pp 46717-46738 (2019)
Security breaches due to attacks by malicious software (malware) continue to escalate posing a major security concern in this digital age. With many computer users, corporations, and governments affected due to an exponential growth in malware attack
Externí odkaz:
https://doaj.org/article/23e2fcd17fcb475bb2117c18d79650ac
Autor:
R. Vinayakumar, Mamoun Alazab, K. P. Soman, Prabaharan Poornachandran, Ameer Al-Nemrat, Sitalakshmi Venkatraman
Publikováno v:
IEEE Access, Vol 7, Pp 41525-41550 (2019)
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyberattacks at the network-level and the host-level in a timely and automatic manner. However, many challenges arise since
Externí odkaz:
https://doaj.org/article/1c4686034712414fa19f2477dd324db5
Publikováno v:
In Procedia Computer Science 2018 143:931-938