Остановите войну!
for scientists:
default search action
P. Deepa Shenoy
- > Home > Persons > P. Deepa Shenoy
Publications
- 2015
- [c24]Vandana Jha, N. Manjunath, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
HOMS: Hindi opinion mining system. ReTIS 2015: 366-371 - 2014
- [c23]Asha S. Manek, V. Sumithra, P. Deepa Shenoy, M. Chandra Mohan, K. R. Venugopal, L. M. Patnaik:
DeMalFier: Detection of Malicious web pages using an effective classifier. ICDSE 2014: 83-88 - [i2]J. S. Saleema, N. Bhagawathi, S. Monica, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Cancer Prognosis Prediction Using Balanced Stratified Sampling. CoRR abs/1403.2950 (2014) - 2013
- [j4]Chetana Hegde, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Authentication using Finger Knuckle Prints. Signal Image Video Process. 7(4): 633-645 (2013) - [i1]R. H. Vishwanath, S. Leena, K. C. Srikantaiah, K. Shreekrishna Kumar, P. Deepa Shenoy, K. R. Venugopal, S. S. Iyengar, Lalit M. Patnaik:
Forecasting Stock Time-Series using Data Approximation and Pattern Sequence Similarity. CoRR abs/1309.2517 (2013) - 2011
- [j3]Chetana Hegde, H. Rahul Prabhu, D. S. Sagar, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Heartbeat biometrics for human authentication. Signal Image Video Process. 5(4): 485-493 (2011) - [c22]Anita Kanavalli, N. Chandra Kiran, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
An Efficient Protocol to Study the Effect of Flooding on Energy Consumption in MANETS. ACC (1) 2011: 141-152 - [c21]Veena H. Bhat, Prasanth G. Rao, S. Krishna, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
An Efficient Framework for Prediction in Healthcare Data Using Soft Computing Techniques. ACC (3) 2011: 522-532 - [c20]N. Chandrakant, A. P. Bijil, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Middleware Service Oriented Rescue and Crime Information System (RCIS) Using Heterogeneous Fixed Nodes in WSNs. ADCONS 2011: 389-398 - [c19]Chetana Hegde, J. Phanindra, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Human authentication using finger knuckle print. Bangalore Compute Conf. 2011: 9 - [c18]N. Chandrakant, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Restricting the admission of selfish or malicious nodes into the network by using efficient security services in middleware for MANETs. ICCCS 2011: 489-492 - [c17]Veena H. Bhat, S. Krishna, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Steganalysis of Perturbed Quantization Using HBCL Statistics and FR Index. ICISTM 2011: 51-60 - [c16]Chetana Hegde, H. Rahul Prabhu, D. S. Sagar, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Statistical Analysis for Human Authentication Using ECG Waves. ICISTM 2011: 287-298 - 2010
- [c15]Veena H. Bhat, S. Krishna, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
JHUF-5 Steganalyzer: Huffman Based Steganalytic Features for Reliable Detection of YASS in JPEG Images. FGIT-SIP/MulGraB 2010: 87-97 - [c14]Chetana Hegde, H. Rahul Prabhu, D. S. Sagar, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Human Authentication Based on ECG Waves Using Radon Transform. FGIT-SecTech/DRBC 2010: 197-206 - [c13]Anita Kanavalli, T. L. Geetha, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Preserving Energy Using Link Protocol in Wireless Networks. FGIT-FGCN (2) 2010: 370-380 - [c12]N. Chandrakant, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens. FGIT-FGCN (2) 2010: 441-449 - [c10]Veena H. Bhat, S. Krishna, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
JPEG Steganalysis Using HBCL Statistics and FR Index. PAISI 2010: 105-112 - [c9]Veena H. Bhat, S. Krishna, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
HUBFIRE - A Multi-class SVM based JPEG Steganalysis using HBCL Statistics and FR Index. SECRYPT 2010: 447-452 - 2009
- [c8]Veena H. Bhat, Prasanth G. Rao, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
An Efficient Prediction Model for Diabetic Database Using Soft Computing Techniques. RSFDGrC 2009: 328-335 - 2008
- [c7]Anita Kanavalli, L. V. Udaya Ranga, A. G. Sathish, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Proactive sliding -window strategy for merging sensor-enabled cars. ICON 2008: 1-5 - 2007
- [c6]L. Vibha, G. M. Harshavardhan, K. Pranaw, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Lesion detection using segmentation and classification of mammograms. Artificial Intelligence and Applications 2007: 342-347 - 2006
- [j2]K. G. Srinivasa, Karthik Sridharan, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
A neural network based CBIR system using STI features and relevance feedback. Intell. Data Anal. 10(2): 121-137 (2006) - [c5]L. Vibha, G. M. Harshavardhan, K. Pranaw, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Classification of Mammograms Using Decision Trees. IDEAS 2006: 263-266 - 2005
- [j1]P. Deepa Shenoy, K. G. Srinivasa, K. R. Venugopal, Lalit M. Patnaik:
Dynamic Association Rule Mining using Genetic Algorithms. Intell. Data Anal. 9(5): 439-453 (2005) - [c4]K. G. Srinivasa, Karthik Sridharan, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
A Dynamic Migration Model for Self-adaptive Genetic Algorithms. IDEAL 2005: 555-562 - 2004
- [c3]P. Deepa Shenoy, K. G. Srinivasa, Achint Oommen Thomas, K. R. Venugopal, Lalit M. Patnaik:
Mining Top - k Ranked Webpages Using Simulated Annealing and Genetic Algorithms. AACC 2004: 137-144 - 2003
- [c2]P. Deepa Shenoy, K. G. Srinivasa, M. P. Mithun, K. R. Venugopal, Lalit M. Patnaik:
Dynamic Subspace Clustering for Very Large High-Dimensional Databases. IDEAL 2003: 850-854 - [c1]P. Deepa Shenoy, K. G. Srinivasa, K. R. Venugopal, Lalit M. Patnaik:
Evolutionary Approach for Mining Association Rules on Dynamic Databases. PAKDD 2003: 325-336
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 17:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint