author: sabu m thampi

Advances in Computing and Network Communications: Proceedings of CoCoNet 2020, Volume 2

... language using hyperspace analogue to language and fuzzy C-means clustering. In: Proceedings of the 12th International Conference on Natural Language Processing, pp. 49–58 (2015) 9. Palanti, D.P., Kolikipogu, R.: Decision list algorithm ...

Advances in Computing and Communications, Part IV: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part IV

... (RTMP) Specification. Adobe Systems Inc. (March 2011), Download available http://adobe.com/devnet/rtmp.html 6. Nokia N95, Nokia Inc. (March 2011), Download available http://nokia.es/link?cid=PLAIN_TEXT_815211 7. Market Research (March ...

Advances in Computing and Communications, Part III: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part III

... POGIL classrooms give each team or student a set of paper handouts for each ... solutions), some issues in schemata counting, and the first steps in ... solutions, and uses convergent questions to develop formulas. The instructor could ...

Advances in Signal Processing and Intelligent Recognition Systems

... words talking, talked, talk and talks to the word, talk. The major task of a ... list of endings while some complex stemmer requires morphological knowledge ... adjectives, adverbs, pronouns and proper names. A suffix list of 18 suffixes ...

Security in Computing and Communications: 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers

... Android Malware Detection Mechanisms Teenu S. John( B ) and Tony Thomas( B ) Indian Institute of Information Technology and ... Android application is examined. Evading Static and Dynamic Android Malware Detection Mechanisms 1 Introduction.

Advances in Computing and Communications, Part II: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part II

... virtual lab tools to make studies on tiger population. Typical tiger population studies need to cover spatial and temporal scales since the effects of anthropogenic pressures that come into conflict with ... Virtual Population Ecology Lab.

Security in Computing and Communications: 5th International Symposium, SSCC 2017, Manipal, India, September 13–16, 2017, Proceedings

... Program if IsIndirectBranchOrCall(ins) if BranchDest(ins) is InsideLoadedModules() if BranchDest(ins) not in Bblist. Instructions(). 5 http://www.talosintelligence.com/. 6 http://public.avast.com/caro2011/. 7 https://github.com/benwaffle ...

Advances in Signal Processing and Intelligent Recognition Systems: Proceedings of Second International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS-2015) December 16-19, 2015, Trivandrum, India

... tracker. In: 2009 Twelfth IEEE International Workshop on Performance Evaluation of Tracking and Surveillance (PETS ... Art of Misdirection Using AES, Bi-layer Steganography and Novel King-Knight's 96 A.S. Rao et al.

Security in Computing and Communications: 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers

... Malwarebytes Anti-ransomware Tool. The product is bundled with the exploit ... malware researcher's system. This prevents the execution of ransomware which ... keys once you make the payment. There are samples such as notpetya, which ...

Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings

... mcafee. com/in/resources/solution-briefs/sb-total-protection-for- dlp.pdf ... Text Classification Techniques Used to Facilitate Cyber Terrorism ... Extraction Algorithms for Classification of Text Documents. In: International Conference ...

Security, Privacy and Anonymity in Computation, Communication and Storage: SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings

... Y Y Y U Y Ref. [15] Y Y Y Y Y 5.1 Network Selection Network selection becomes a serious issue with the emergence of various access networks that provide multiple access chances in the next generation wireless access networks because ...

Intelligent Systems, Technologies and Applications: Proceedings of ISTA 2018

... word occur, and it poses a challenge as the meaning itself will change. Hence, the text content for SA task needs to perform disambiguation as discussed in [5]. In [5], a methodology for SA of text data in Hindi using SentiWordNet is ...

Advances in Computing and Network Communications: Proceedings of CoCoNet 2020, Volume 1

Proceedings of CoCoNet 2020, Volume 1 Sabu M. Thampi, Erol Gelenbe, Mohammed ... login and logout information. In the login session, it store the details of ... Facebook maintains the advertisements displayed on 192 B. G. Gutam et al.

Managing Trust in Cyberspace

Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey. ‱ Once the user gains the ... in different domains without presenting additional credentials . This model is ... login with Google [ 13 ] and Facebook credentials , and support federated ...

Security in Computing and Communications: 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings

... Antenna in Cognitive Radio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403 Komal Pawar and Tanuja Dhope Diagnosis of Multiple Stuck-at Faults Using Fault Element Graph with Reduced Power ...

Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012, Proceedings

... Ad Hoc Wireless Networks. Pearson Education (2008) 2. Zhang, Y., Lee, W ... 8(1) (2011) 7. Zeng, Chen, Z.: A Cluster Header Election Scheme Based on ... Computer Society, Washington, DC (2000) Krishna, P., Vaidya, N.H., Chatterjee, M ...

Advances in Computing and Communications, Part III: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings

... anti-keyloggers. Yet these applications certainly mitigate the risk of text ... keys you've typed. Keyloggers end up logging only the encrypted keys, which ... malware and a firewall in place would further strengthen the protection. The ...

Computing Science, Communication and Security: 4th International Conference, COMS2 2023, Mehsana, Gujarat, India, February 6–7, 2023, Revised Selected Papers

... M. Thampi, Noor Zaman Jhanjhi, Satyen Parikh, Kiran Amin. Facebook login evidence is shown in the Fig. 7 and searched people related evidences in the Facebook is shown in Fig. 8. We are able to extract the evidences related to profile ...

Recent Advances in Intelligent Informatics: Proceedings of the Second International Symposium on Intelligent Informatics (ISI'13), August 23-24 2013, Mysore, India

... tajweed" rules). Indeed, even obeying to tajweed rules, slight variations are still possible but might be distinguished as allophonic variation on the low level of segmentation (allophonic level). Precisely, statistics show that the ...

Advances in Signal Processing and Intelligent Recognition Systems: 5th International Symposium, SIRS 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers

... traffic sign recognition until the arrival of German Traffic Sign Recognition Benchmark (GTSRB) [17] and the German Traffic Sign Detection Benchmark (GTSDB) [9] which are two openly accessible broad datasets for the correlation of ...

Advances in Computing and Communications, Part II: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings

... NFDUMP - NetFlow processing tools (2009), http://nfdump.sourceforge.net/ 6. INVEA-TECH. Standard FlowMon Probe (2009), http://www.invea-tech.com/ 7. Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A., Rivest, R.L.: Identification and ...

Advances in Computing and Communications, Part I: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings

... Matlab model is based on the results obtained in table 1. The experi- mental ... Matlab model is a look up table of these values obtained in the biosensor lab ... mod- el with biosensor model, an experimental setup is used to compare the ...

Advances in Signal Processing and Intelligent Recognition Systems: 6th International Symposium, SIRS 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers

... Resume Scoring Framework (described in Sect. 2, “Text Similarity Scoring Framework” and pseudo algorithm given under ... UI Developer Java Developer UI Developer Java Developer Java Developer UI Developer F Rank - Resume-to-JD Match ...

Advances in Signal Processing and Intelligent Recognition Systems: 4th International Symposium SIRS 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers

... Muzzammil Hussain Ramachandran K. I. Manikandan J. D. John Aravindhar Kouser K. Navin Kumar Rakesh Kumar Abraham Mathew Rajeswari Mukesh Rajarshi Pal School of Computing and Electrical Engineering, IIT Mandi, India Indian Institute of ...

Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings

... Chrome, ÎŒTorrent, Internet Download Manager (IDM) and WinRar. Initially we did all the investigation in normal environment. We installed each software and collected forensic artifacts related to them. The results are shown in Table 1 ...

Applied Soft Computing and Communication Networks: Proceedings of ACN 2020

... INR, whereas WIT denotes stock prices in USD. To unify the given price ... historical stock market data in its raw form includes date, open, high, low ... USD/INR for a sample duration of one week, i.e., 01-01-2019 to 07-01-2019, and ...

Applied Soft Computing and Communication Networks: Proceedings of ACN 2019

... statistic called F-distribution or F-statistic, which is the ratio of the ... ANOVA is used to comparing the means of two or more columns and two or more ... ANOVA Table The ANOVA table is used to define the variability in the model by ...

Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings

... University of Constantine 1, Algeria University of Arkansas at Little Rock, USA Imam University, Saudi Arabia SSBT College of Engineering and Technology, India University of Ottawa, Canada Galgotias University, India IRT System X, France ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.