Zobrazeno 1 - 10
of 81
pro vyhledávání: '"K. Poulose Jacob"'
Publikováno v:
Journal of Information Security and Applications. 41:75-91
Security vulnerabilities are frequently detected and exploited in modern web applications. Intruders obtain unrestricted access to the information stored at the back-end database server of a web application by exploiting security vulnerabilities. Cod
Publikováno v:
Smart Intelligent Computing and Applications ISBN: 9789811319204
The automatic detection of glaucoma with the fundus eye image analysis using novel techniques is presented in this paper. The classification of glaucoma is done using cascade correlation neural network. The advantage of this network is that it adds t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d2a9944024d8f275aa2d1c14e869daf8
https://doi.org/10.1007/978-981-13-1921-1_64
https://doi.org/10.1007/978-981-13-1921-1_64
Publikováno v:
Lecture Notes on Data Engineering and Communications Technologies ISBN: 9789811076404
WIR
WIR
Governments, multilateral agencies like the World Bank, United Nations, and Development Banks as well as other nonprofits are involved in a variety of developmental activities across the world. A lot of resources are spent to ensure proper consultati
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::65bb507505150523b34fa951c68bc07d
https://doi.org/10.1007/978-981-10-7641-1_17
https://doi.org/10.1007/978-981-10-7641-1_17
Autor:
K. Poulose Jacob
Publikováno v:
Oriental journal of computer science and technology. 12:01-02
Autor:
K. Poulose Jacob, Sheena Mathew
Publikováno v:
International Journal on Computational Science & Applications. 5:11-26
International Journal of Computer Science and Applications, Vol. 5, No. 4, pp 11 - 25, 2008
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319589664
BDTA
BDTA
The ability to present data or information in a pictorial format makes data visualization, one of the major requirement in all data mining efforts. A thorough study of techniques, which presents visualization, it was observed that many of the describ
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2d7b0c7caafae0f84a02531831720e6b
https://doi.org/10.1007/978-3-319-58967-1_1
https://doi.org/10.1007/978-3-319-58967-1_1
Autor:
K. Poulose Jacob, Mini Ulanat
Publikováno v:
Hybrid Intelligence for Social Networks ISBN: 9783319651385
Online social networks promote faster propagation of new ideas and thoughts. The percolation of social media into our daily life has influenced the way in which consumers interact and behave across the world. Social media tools are emerging as powerf
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6efb5d3fde9ed34f4bdd4c6e700557ba
https://doi.org/10.1007/978-3-319-65139-2_9
https://doi.org/10.1007/978-3-319-65139-2_9
Autor:
K. Poulose Jacob, Joy Preetha Theresa
Publikováno v:
International Journal of Wireless & Mobile Networks. 5:189-196
In this paper we investigate the problem of cache resolution in a mobile peer to peer ad hoc network. In our vision cache resolution should satisfy the following requirements: (i) it should result in low message overhead and (ii) the information shou
Publikováno v:
International Journal of Network Security & Its Applications. 5:73-82
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013
Publikováno v:
International Journal of Research in Engineering and Technology. :590-597
Speech is the most natural means of communication among human beings and speech processing and recognition are intensive areas of research for the last five decades. Since speech recognition is a pattern recognition problem, classification is an impo