Author:
Kousar Nikhath A.,Sandhya N.,Khanum Pathan Sayeeda,Venkatesh B.
Publisher
Springer Nature Singapore
Reference32 articles.
1. Amrutha, C.V., Chandran, J., Joseph, A.: Deep Learning Approach for Suspicious Activity Detection from Surveillance Video, pp. 335–339 (2020). https://doi.org/10.1109/ICIMIA48430.2020.9074920
2. Cheoi, K.: Temporal saliency-based suspicious behavior pattern detection. Appl. Sci. 10, 1020 (2020). https://doi.org/10.3390/app10031020
3. Basu, S., Kannayaram, G., Ramasubbareddy, S., Venkatasubbaiah, C.: Improved genetic algorithm for monitoring of virtual machines in cloud environment. In: Smart Intelligent Computing and Applications, pp. 319–326. Springer, Singapore (2019)
4. Somula, R., Sasikala, R.: Round robin with load degree: an algorithm for optimal cloudlet discovery in mobile cloud computing. Scalable Comput.: Pract. Exp. 19(1), 39–52 (2018)
5. Somula, R., Anilkumar, C., Venkatesh, B., Karrothu, A., Kumar, C. P., Sasikala, R.: Cloudlet services for healthcare applications in mobile cloud computing. In: Proceedings of the 2nd International Conference on Data Engineering and Communication Technology, pp. 535–543. Springer, Singapore (2019)