Takip et
Kola Sujatha P
Kola Sujatha P
Senior Assistant Professor of Information Technology, Anna University
annauniv.edu üzerinde doğrulanmış e-posta adresine sahip
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Lip feature extraction for visual speech recognition using Hidden Markov Model
P Sujatha, MR Krishnan
2012 International Conference on Computing, Communication and Applications, 1-5, 2012
182012
Network intrusion detection system using genetic network programming with support vector machine
PK Sujatha, CS Priya, A Kannan
Proceedings of the International Conference on Advances in Computing …, 2012
152012
A behavior based approach to host-level intrusion detection using self-organizing maps
PK Sujatha, A Kannan, S Ragunath, KS Bargavi, S Githanjali
2008 First International Conference on Emerging Trends in Engineering and …, 2008
122008
Enhancement of segmentation and feature fusion for apple disease classification
PK Sujatha, J Sandhya, JS Chaitanya, R Subashini
2018 Tenth International Conference on Advanced Computing (ICoAC), 175-181, 2018
112018
Reduction of big data sets using fuzzy clustering
S Prabha, PK Sujatha
International Journal of Advanced Research in Computer Engineering …, 2014
112014
Performance evaluation of classifiers for analysis of road accidents
C Sugetha, L Karunya, E Prabhavathi, PK Sujatha
2017 Ninth International Conference on Advanced Computing (ICoAC), 365-368, 2017
62017
Analysis and Performance Evaluation of Cosine Neighbourhood Recommender System.
K Periyasamy, J Jaiganesh, K Ponnambalam, J Rajasekar, K Arputharaj
International Arab Journal of Information Technology (IAJIT) 14 (5), 2017
62017
Segmentation based representation for tweet hashtag
SP Sharmila, PK Sujatha
2015 Seventh International Conference on Advanced Computing (ICoAC), 1-7, 2015
52015
Network level anomaly detection system using MST based genetic clustering
P Kola Sujatha, R Arun, PV Shanthoosh, I Ezra Prince Jebahar, A Kannan
Advances in Network Security and Applications: 4th International Conference …, 2011
42011
Memory efficacious pattern matching intrusion detection system
S Dhivya, D Dhakchianandan, A Gowtham, PK Sujatha, A Kannan
2013 International Conference on Recent Trends in Information Technology …, 2013
32013
Novel Pixel-based approach for mouth localization
P Sujatha, M Radhakrishnan
International Journal of Computer Applications 975, 8887, 2013
32013
Mouth Segmentation Using Coordinate-Based Method for the Improvement of Visual Speech Recognition
P Sujatha, M Radhakrishnan
Applied Mathematics & Information Sciences 12 (4), 891-897, 2018
22018
Real time lip tracking for human-computer interaction
P Sujatha, M Radhakrishnan
International Journal of Engineering Research and Technology 2 (11), 3455-3461, 2013
22013
Topic summarisation on tweets
T Divyasree, PK Sujatha
2015 Seventh International Conference on Advanced Computing (ICoAC), 1-6, 2015
12015
SPEAKER-INDEPENDENT VISUAL LIP ACTIVITY DETECTION FOR HUMAN-COMPUTER INTERACTION
P Sujatha, M Radhakrishnan
IJRET: International Journal of Research in Engineering and Technology 2 (11 …, 2013
12013
Clusters in chaos: A deep unsupervised learning paradigm for network anomaly detection
S Perumal, PK Sujatha, S Krishnaa, M Krishnan
Journal of Network and Computer Applications 235, 104083, 2025
2025
Anomaly Detection in Video Using Gaussian Model and Recurrent Neural Network
PK Sujatha, S Yuvarani
2018 Tenth International Conference on Advanced Computing (ICoAC), 202-207, 2018
2018
Trustworthy distributed collaborative intrusion detection using mobile agents
N Asokan, A Sujitha, R Poornima, PK Sujatha, A Kannan
2013 International Conference on Recent Trends in Information Technology …, 2013
2013
Application-Layer Attacks Sleuthing Model Using Eccentric Classifiers
PK Sujatha, M Ajay, G Hariharan, S Albert, A Kannan
European Journal of Scientific Research 78 (3), 375-383, 2012
2012
Weighted Linked Data based Unsupervised Feature Selection
JS Jenifa, PK Sujatha
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20