Lip feature extraction for visual speech recognition using Hidden Markov Model P Sujatha, MR Krishnan 2012 International Conference on Computing, Communication and Applications, 1-5, 2012 | 18 | 2012 |
Network intrusion detection system using genetic network programming with support vector machine PK Sujatha, CS Priya, A Kannan Proceedings of the International Conference on Advances in Computing …, 2012 | 15 | 2012 |
A behavior based approach to host-level intrusion detection using self-organizing maps PK Sujatha, A Kannan, S Ragunath, KS Bargavi, S Githanjali 2008 First International Conference on Emerging Trends in Engineering and …, 2008 | 12 | 2008 |
Enhancement of segmentation and feature fusion for apple disease classification PK Sujatha, J Sandhya, JS Chaitanya, R Subashini 2018 Tenth International Conference on Advanced Computing (ICoAC), 175-181, 2018 | 11 | 2018 |
Reduction of big data sets using fuzzy clustering S Prabha, PK Sujatha International Journal of Advanced Research in Computer Engineering …, 2014 | 11 | 2014 |
Performance evaluation of classifiers for analysis of road accidents C Sugetha, L Karunya, E Prabhavathi, PK Sujatha 2017 Ninth International Conference on Advanced Computing (ICoAC), 365-368, 2017 | 6 | 2017 |
Analysis and Performance Evaluation of Cosine Neighbourhood Recommender System. K Periyasamy, J Jaiganesh, K Ponnambalam, J Rajasekar, K Arputharaj International Arab Journal of Information Technology (IAJIT) 14 (5), 2017 | 6 | 2017 |
Segmentation based representation for tweet hashtag SP Sharmila, PK Sujatha 2015 Seventh International Conference on Advanced Computing (ICoAC), 1-7, 2015 | 5 | 2015 |
Network level anomaly detection system using MST based genetic clustering P Kola Sujatha, R Arun, PV Shanthoosh, I Ezra Prince Jebahar, A Kannan Advances in Network Security and Applications: 4th International Conference …, 2011 | 4 | 2011 |
Memory efficacious pattern matching intrusion detection system S Dhivya, D Dhakchianandan, A Gowtham, PK Sujatha, A Kannan 2013 International Conference on Recent Trends in Information Technology …, 2013 | 3 | 2013 |
Novel Pixel-based approach for mouth localization P Sujatha, M Radhakrishnan International Journal of Computer Applications 975, 8887, 2013 | 3 | 2013 |
Mouth Segmentation Using Coordinate-Based Method for the Improvement of Visual Speech Recognition P Sujatha, M Radhakrishnan Applied Mathematics & Information Sciences 12 (4), 891-897, 2018 | 2 | 2018 |
Real time lip tracking for human-computer interaction P Sujatha, M Radhakrishnan International Journal of Engineering Research and Technology 2 (11), 3455-3461, 2013 | 2 | 2013 |
Topic summarisation on tweets T Divyasree, PK Sujatha 2015 Seventh International Conference on Advanced Computing (ICoAC), 1-6, 2015 | 1 | 2015 |
SPEAKER-INDEPENDENT VISUAL LIP ACTIVITY DETECTION FOR HUMAN-COMPUTER INTERACTION P Sujatha, M Radhakrishnan IJRET: International Journal of Research in Engineering and Technology 2 (11 …, 2013 | 1 | 2013 |
Clusters in chaos: A deep unsupervised learning paradigm for network anomaly detection S Perumal, PK Sujatha, S Krishnaa, M Krishnan Journal of Network and Computer Applications 235, 104083, 2025 | | 2025 |
Anomaly Detection in Video Using Gaussian Model and Recurrent Neural Network PK Sujatha, S Yuvarani 2018 Tenth International Conference on Advanced Computing (ICoAC), 202-207, 2018 | | 2018 |
Trustworthy distributed collaborative intrusion detection using mobile agents N Asokan, A Sujitha, R Poornima, PK Sujatha, A Kannan 2013 International Conference on Recent Trends in Information Technology …, 2013 | | 2013 |
Application-Layer Attacks Sleuthing Model Using Eccentric Classifiers PK Sujatha, M Ajay, G Hariharan, S Albert, A Kannan European Journal of Scientific Research 78 (3), 375-383, 2012 | | 2012 |
Weighted Linked Data based Unsupervised Feature Selection JS Jenifa, PK Sujatha | | |