Zobrazeno 1 - 10
of 18
pro vyhledávání: '"P. Kola Sujatha"'
Publikováno v:
Lecture Notes on Data Engineering and Communications Technologies ISBN: 9783030246426
In machine learning, an algorithm usually acquits finer for a particular domain. The work proposes a novel idea of mapping features of source domain to the features of target domain. The model designed for one dataset is applied to another dataset of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c6f97e6a51ef11e838d26c0a3e999126
https://doi.org/10.1007/978-3-030-24643-3_87
https://doi.org/10.1007/978-3-030-24643-3_87
Autor:
P. Kola Sujatha, S. Yuvarani
Publikováno v:
2018 Tenth International Conference on Advanced Computing (ICoAC).
Anomaly detection in surveillance system demands to address various problems. The proposed work aims to identify different types of anomalies in different datasets such that traffic anomaly in QMUL, a pedestrian anomaly in Avenue and loitering anomal
Publikováno v:
2018 Tenth International Conference on Advanced Computing (ICoAC).
Diseases in fruit cause serious problem in economic loss and production in agricultural industry. The quality and yield of the fruits can be degraded too much with the presence of the diseases in the fruit. It is critical to detect the diseases prese
Publikováno v:
2017 Ninth International Conference on Advanced Computing (ICoAC).
Road accidents happen quite often nowadays. Some accidents result in severe injuries whereas few are fatal. The consequences have a great impact on society. Many analytical procedures have been carried out to determine the causes of road accidents. T
Autor:
P. Kola Sujatha, T. Divyasree
Publikováno v:
2015 Seventh International Conference on Advanced Computing (ICoAC).
Due to the sheer volume of tweets generated by a micro blog site like Twitter, it is often difficult to summarize the required content of the user or the data analyst to evaluate the stream of Twitter data from tweets in million amount which contain
Autor:
S. P. Sharmila, P. Kola Sujatha
Publikováno v:
2015 Seventh International Conference on Advanced Computing (ICoAC).
The effectiveness of segmenting the tweet hashtag for recognizing the Named entities is explored. Segmenting the hashtag, can offer huge help in recognizing named entities in the hashtags of tweets. The hashtag is segmented using sliding window of va
Publikováno v:
2014 International Conference on Recent Trends in Information Technology.
Social Networks (SN) are popular among the people to interact with their friends through the internet. Users spending their time in popular social networking sites like facebook, Myspace and twitter to share the personal information. Cloning attack i
Publikováno v:
2013 International Conference on Recent Trends in Information Technology (ICRTIT).
A distributed environment is one in which intrusions are prevalent and drastically affect the performance of the networks. Therefore a need for Intrusion Detection Networks arises. Collaborators could be used here to enhance the detection of attacks.
Publikováno v:
2013 International Conference on Recent Trends in Information Technology (ICRTIT).
Publikováno v:
ICACCI
Nowadays Internet Services spread all over the world. There are large amount of data present in the internet services. However the internet services increases at the same time intrusions also increases. Network Intrusion Detection Systems are used to