S. Valli

Orcid: 0000-0002-7570-2563

According to our database1, S. Valli authored at least 17 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Time series-based workload prediction using the statistical hybrid model for the cloud environment.
Computing, February, 2023

2022
An efficient fuzzy deep learning approach to recognize 2D faces using FADF and ResNet-164 architecture.
J. Intell. Fuzzy Syst., 2022

2021
Multi-objective heuristics algorithm for dynamic resource scheduling in the cloud computing environment.
J. Supercomput., 2021

An Enhanced Approach to Map Domain-Specific Words in Cross-Domain Sentiment Analysis.
Inf. Syst. Frontiers, 2021

Multi-lingual text detection and identification using agile convolutional neural network.
Comput. Intell., 2021

A comparative approach on detecting multi-lingual and multi-oriented text in natural scene images.
Appl. Intell., 2021

2019
A Fuzzy Approach to Recognize Face Using Contourlet Transform.
Int. J. Fuzzy Syst., 2019

2018
An algorithm for multi-sensor image fusion using maximum a posteriori and nonsubsampled contourlet transform.
Comput. Electr. Eng., 2018

2017
An Approach to Defend Global Eavesdropper in Sensor Networks.
Wirel. Pers. Commun., 2017

An enhanced text detection technique for the visually impaired to read text.
Inf. Syst. Frontiers, 2017

2012
Region-based image retrieval using the semantic cluster matrix and adaptive learning.
Int. J. Comput. Sci. Eng., 2012

Impact of Blackhole and Rushing Attack on the Location-Based Routing Protocol for Wireless Sensor Networks.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2010
Ontology Based Query Expansion Using Word Sense Disambiguation
CoRR, 2010

2007
Generation of Group Key Using Enhanced One Way Function Tree Group Rekey Protocol.
Proceedings of the 2007 International Conference on Computing: Theory and Applications (ICCTA 2007), 2007

2005
An Enhanced One Way Function Tree Rekey Protocol Based on Chinese Remainder Theorem.
Proceedings of the Computer and Information Sciences, 2005

2004
A Tool to Automatically Generate Test Cases for C++ Programs.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004

A Tool to Automatically Detect Defects in C++ Programs.
Proceedings of the Intelligent Information Technology, 2004


  Loading...