Zobrazeno 1 - 10
of 61
pro vyhledávání: '"Suvasini Panigrahi"'
Autor:
Sharmila Subudhi, Suvasini Panigrahi
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 3, Pp 972-981 (2022)
In this paper, we have proposed a novel approach for detecting intrusive activities in databases by the use of clustering and information fusion through ensemble learning. We have applied OPTICS clustering on the transaction attributes for building u
Externí odkaz:
https://doaj.org/article/55f6da7f42ff4fdea2cc3023000b8ced
Autor:
Sharmila Subudhi, Suvasini Panigrahi
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 32, Iss 5, Pp 568-575 (2020)
This paper presents a novel hybrid approach for detecting frauds in automobile insurance claims by applying Genetic Algorithm (GA) based Fuzzy C-Means (FCM) clustering and various supervised classifier models. Initially, a test set is extracted from
Externí odkaz:
https://doaj.org/article/b0b5ee386cb24e47a6794d00dbc0cbfa
Publikováno v:
Journal of King Saud University: Engineering Sciences, Vol 31, Iss 1, Pp 52-60 (2019)
In this article, we have proposed a novel quadrigeminal scheme for selecting event-reporting scalar premiers that inform the prevailing event information to their corresponding camera sensors while contributing maximal event area coverage along with
Externí odkaz:
https://doaj.org/article/2b2185d1283f475f9d79580c779ce281
Publikováno v:
Ain Shams Engineering Journal, Vol 9, Iss 4, Pp 815-825 (2018)
The necessity of having optimum camera activation is rapidly increasing in distributed environment as well as wireless sensor networks. In the current research, we have studied the event boundary detection approach for redundant data minimization by
Externí odkaz:
https://doaj.org/article/653c441b66a844ef95ff00adf905edaf
Autor:
Sharmila Subudhi, Suvasini Panigrahi
Publikováno v:
Vietnam Journal of Computer Science, Vol 5, Iss 3-4, Pp 205-217 (2018)
Abstract A novel two-stage fraud detection system in mobile telecom networks has been presented in this paper that identifies the malicious calls among the normal ones in two stages. Initially, a genetic algorithm-based optimized fuzzy c-means cluste
Externí odkaz:
https://doaj.org/article/72f195e5dcf44c5bb40f2a6f37c3febd
Publikováno v:
IET Networks, Vol 4, Iss 6, Pp 314-328 (2015)
The major challenge in sensor networks is how to have a perfect coverage of the region to be monitored. This study reports a novel algorithm inspired by centralised cum sub‐centralised scheme that works efficiently for handling multiple events that
Externí odkaz:
https://doaj.org/article/ae747df9831b43fbbd6235ac9478c72a
Publikováno v:
The Journal of Engineering (2016)
Externí odkaz:
https://doaj.org/article/0514219ac45b431eb2bcb10cfea27933
Publikováno v:
ECS Transactions. 107:12887-12900
Cloud computing is growing tremendously for its on-demand services, a massive pool of distributed resources, rapid provisioning of resources, and many more. It empowers many organizations/customers to build on-demand applications without investing la
Autor:
Suvasini Panigrahi, Sharmila Subudhi
Publikováno v:
Journal of King Saud University - Computer and Information Sciences. 34:972-981
In this paper, we have proposed a novel approach for detecting intrusive activities in databases by the use of clustering and information fusion through ensemble learning. We have applied OPTICS clustering on the transaction attributes for building u
Publikováno v:
International Journal of Information Technology. 13:1417-1422
In recent years, cloud computing is becoming an attractive research topic for its emerging issues and challenges. Not only in research but also the enterprises are rapidly adopting cloud computing because of its numerous profitable services. Cloud co