Author:
Ishwarya K.,Nithya A.Alice
Reference35 articles.
1. An Investigation on android background services for controlling the unauthorized accesses using android LOG system
2. Improved Dragonfly Optimizer for Instrusion Detection Using Deep Clustering CNN-PSO Classifier;bhuvansehwari;CMC Comput Mater Continua,2021
3. Deep Learning Based Modeling of Groundwater Storage Change;anul haq;CMC Comput Mater Continua,2021
4. Secure biometric authentication with de-duplication on distributed cloud storage;venkatachalam;Peer J Computer Science,2021
5. ML Based Sign Language Recognition System
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Comparison of Sentiment Analysis Algorithms Using Twitter Dataset for Real Time Analysis of Cricket Sport;2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT);2024-01-04
2. Predictive Analysis of NBA Game Outcomes through Machine Learning;The 6th International Conference on Machine Learning and Machine Intelligence;2023-10-27
3. Machine Learning Techniques for Analyzing Athletic Performance in Sports using GWO-CNN Model;2022 6th International Conference on Electronics, Communication and Aerospace Technology;2022-12-01
4. System Construction of Athlete Health Information Protection Based on Machine Learning Algorithm;BioMed Research International;2022-09-28