Influence of geopolymer aggregates on micro-structural and durability characteristics of OPC concrete

M Priyanka, K Muniraj, SRC Madduru - Journal of Building Pathology and …, 2022 - Springer
This paper explores the physical, mechanical and durability characteristics of Fly ash—
ground granulated blast furnace slag (GGBS) based Geopolymer aggregates include …

High dimensional deep data clustering architecture towards evolving concept

A Sumathi, K Yasotha, S Nandhinidevi - NVEO-NATURAL VOLATILES & …, 2021 - nveo.org
Data Clustering on the evolving data stream has becoming primary and vital tasks in the
natural language processing in data driven application domains. Performance analysis of …

An Efficient Framework for Fake Profile Identification Using Metaheuristic and Deep Learning Techniques

WR Varuna, K Shalini, MEA Roy - Journal of Positive School …, 2022 - journalppw.com
The rise of fraudulent accounts is one of the most severe concerns in the digital age. Fake
accounts have been judged particularly destructive to both OSN service providers and their …

[PDF][PDF] COMPREHENSIVE ANALYSIS OF WIRELESS SENSOR NETWORK PROTOCOLS

A Kamalraj, GA Prasanna - romanpub.com
ABSTRACT Wireless Sensor Network (WSN) is an emerging technology consisting of
spatially scattered independent devices using sensors to observe physical and …

[PDF][PDF] REVOLUTIONIZING AGRICULTURE THROUGH MOBILE CROWD SENSING: ENHANCING DATA COLLECTION FOR SMART FARMING

ASP KC, GA Prasanna - romanpub.com
In the realm of smart agriculture, the pursuit of efficiency and intelligence in physical farm
management has paved the way for transformative advancements. While this paradigm …

[PDF][PDF] DEEP SOCIAL ATTENTION NETWORK ARCHITECTURE TO DETECT AND PREVENT THE UNWANTED INFORMATION PROPAGATION IN SOCIAL MEDIA …

MD Kalaivani, A Revathi - Journal of Data Acquisition and Processing, 2023 - sjcjycl.cn
Abstract Online Social Media and Event-based Social Networks are exploring a vast volume
of unwanted information on the proliferation of user-generated content. Social Media …

[PDF][PDF] An intelligent forecasting system for unauthorized URL identification using deep learning

WR Varuna, M Harshini, KT Baby - International Journal of Health Sciences - academia.edu
A cyber-attack is a destructive action carried out in cyberspace by an intruder, a group, an
association, or a country that targets computer information systems, infrastructures, personal …

Color Image Edge Detection Based on Fuzzy Rule Based Approach

V Thiagarasu - 2017 - papers.ssrn.com
Edge detection method is one of the important techniques in Image Segmentation, which is
used to find out the objects in the input image in exact manner. An edge is the boundary …

[引用][C] Color Image Edge Detection Using Fuzzy Membership Functions

EB Kumar, V Thiagarasu - International Journal of Scientific Research in Science …, 2017

[引用][C] AN INTELLIGENT FAKE PROFILE CLASSIFICATION SYSTEM USING DEEP LEARNING TECHNIQUES.

WR Varuna, L Prasanth, A Pabitha - International Journal of Early Childhood Special …, 2022