Zobrazeno 1 - 10
of 32
pro vyhledávání: '"T. Jaya Lakshmi"'
Publikováno v:
IEEE Access, Vol 12, Pp 51208-51222 (2024)
Many real-world problems can be modelled in the form of complex networks. Social networks such as research collaboration networks and facebook, biological neural networks such as human brains, biomedical networks such as drug-target interactions and
Externí odkaz:
https://doaj.org/article/4056c7bcccbb4e38a0cc0aa1ebfe96a5
Publikováno v:
Entropy, Vol 26, Iss 6, p 433 (2024)
Link prediction plays a crucial role in identifying future connections within complex networks, facilitating the analysis of network evolution across various domains such as biological networks, social networks, recommender systems, and more. Researc
Externí odkaz:
https://doaj.org/article/52a98a7ff2df486fade5753097956df3
Autor:
Ramdas Kapila, Thirumalaisamy Ragunathan, Sumalatha Saleti, T. Jaya Lakshmi, Mohd Wazih Ahmad
Publikováno v:
IEEE Access, Vol 11, Pp 64324-64347 (2023)
Cardiovascular disease is the primary reason for mortality worldwide, responsible for around a third of all deaths. To assist medical professionals in quickly identifying and diagnosing patients, numerous machine learning and data mining techniques a
Externí odkaz:
https://doaj.org/article/b8311dbd29554d07ad953bc582a33435
Publikováno v:
Entropy, Vol 25, Iss 9, p 1360 (2023)
Matrix factorization is a long-established method employed for analyzing and extracting valuable insight recommendations from complex networks containing user ratings. The execution time and computational resources demanded by these algorithms pose l
Externí odkaz:
https://doaj.org/article/0757652fb64b40bfbd75822f98b11b54
Publikováno v:
IEEE Access, Vol 10, Pp 123301-123315 (2022)
Mining high utility sequential patterns is observed to be a significant research in data mining. Several methods mine the sequential patterns while taking utility values into consideration. The patterns of this type can determine the order in which i
Externí odkaz:
https://doaj.org/article/ab135d866fd1402d8b43770f819608ba
Publikováno v:
International Journal of Safety and Security Engineering. 12:381-386
History shows that, several cloned and fraudulent websites are developed in the World Wide Web to imitate legitimate websites, with the main motive of stealing sensitive important informational and economic resources from web surfers and financial or
Autor:
Sriramulu Bojjagani, P. V. Venkateswara Rao, Dinesh Reddy Vemula, B Ramachandra Reddy, T. Jaya Lakshmi
Publikováno v:
Peer-to-Peer Networking and Applications. 15:1163-1188
Autor:
Dronavalli Krishna Tejaswi, Himanshi Chauhan, T. Jaya Lakshmi, Rachakonda Swetha, Nallamothu Navya Sri
Publikováno v:
2022 2nd International Conference on Intelligent Technologies (CONIT).
Autor:
Shakir Khan, V. Saravanan, Gnanaprakasam C. N, T. Jaya Lakshmi, Nabamita Deb, Nashwan Adnan Othman
Publikováno v:
Computational intelligence and neuroscience. 2022
With the rapid development of mobile medical care, medical institutions also have the hidden danger of privacy leakage while sharing personal medical data. Based on the k-anonymity and l-diversity supervised models, it is proposed to use the classifi
Publikováno v:
IOT with Smart Systems ISBN: 9789811639449
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5dfa5d0ea4a6b4e1d062a36b3eda9a7e
https://doi.org/10.1007/978-981-16-3945-6_74
https://doi.org/10.1007/978-981-16-3945-6_74