Zobrazeno 1 - 10
of 11
pro vyhledávání: '"V. V. S. S. S. Balaram"'
Publikováno v:
International Journal of Fuzzy System Applications. 10:79-100
This paper put forward for the segmentation process on the hyperspectral remote sensing satellite scene. The prevailing algorithm, fuzzy c-means, is performed on this scene. Moreover, this algorithm is performed in both inter band as well as intra ba
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811333286
Large software products require high effort to maintain the code base. Most of the time managers face challenging situations for efficient allocation of resources. In this paper, we proposed a novel approach to aid the software engineering managers t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::905c6f2fb0a83bb5f4db791c8e5df7ad
https://doi.org/10.1007/978-981-13-3329-3_52
https://doi.org/10.1007/978-981-13-3329-3_52
Publikováno v:
Journal of Information and Optimization Sciences. 37:449-469
With the inception and uncontrollable growth of digital documents, Automatic Topic Extraction is found to be an active research topic. In order to handle the processing of documents, variety of algorithms was presented in literature for topic extract
Autor:
Sk. Khaja Shareef, V. V. S. S. S. Balaram, Ramu Kuchipudi, Ahmed Abdul Moiz Qyser, N. Thulasi Chitra
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811315794
Security in wireless sensor networks is very crucial especially whenever they deployed in military applications. Cryptography is used to protect sensitive information from disclosure. Key management is important component in cryptography. Cryptograph
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2f7820159b6952e62dc588b48d1781c7
https://doi.org/10.1007/978-981-13-1580-0_30
https://doi.org/10.1007/978-981-13-1580-0_30
This research will identify different patient's online behaviours and similarities that can help patient-clinician communications to improve to discover the future or additional threats to raise awareness of causes and consequences. To scale the mode
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::63edad923e8f3dd8b60dcf461ac78db2
https://doi.org/10.4018/978-1-5225-5222-2.ch012
https://doi.org/10.4018/978-1-5225-5222-2.ch012
Publikováno v:
2017 Intelligent Systems Conference (IntelliSys).
Software engineering processes are hard to understand, and related tasks frequently produce lot of information which can be used for development of strategy for future Projects. In the last decade, a large number of software data sets have been creat
Autor:
V. V. S. S. S. Balaram, Md. Riyazuddin
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811024702
Majority of the data available for knowledge discovery and information retrieval are prone to identity disclosure. The major act to disclose the identity is through exploring the pattern of attributes involved in data formation. The existing benchmar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c70567e6f774c18d005bf0c5eb91234e
https://doi.org/10.1007/978-981-10-2471-9_58
https://doi.org/10.1007/978-981-10-2471-9_58
Autor:
V. V. S. S. S. Balaram
Publikováno v:
International Journal of Scientific Research in Computer Science, Engineering and Information Technology. :125-125
The research also explores ways to protect online identities of patients from disclosure or privacy concerns). We will address the situation of the patient like situation of heart problem that experience life-threatening emergencies. With adequate le
Publikováno v:
2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).
Wireless Sensor Networks are installed in hostile areas. The security issues in wireless sensor networks are very important. Getting secure links between nodes is a challenging problem in WSNs. They are more vulnerable to security attacks than wired
Publikováno v:
2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).
Wireless Sensor Networks are installed in hostile areas. The security issues in wireless sensor networks are very important. Getting secure links between nodes is a challenging problem in WSNs. They are more vulnerable to security attacks than wired