Search Results - "Shafana, N. Jeenath"

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Fuzzy Hybrid Filtration based Rician Noise Removal and Classification of MRI Images without Segmentation using Deep Learning Technique by Shafana, N. Jeenath, SenthilSelvi, A.

    “…The research aims to classify Magnetic Resonance Imaging (MRI) without segmentation to detect brain diseases. To classify the MRI images, the dataset has to be…”
    Get full text
    Conference Proceeding
  2. 2

    Exploitation Analysis of Buffer Overflow in SL-Mail Server by Shafana, N. Jeenath, Pawar, Kshitij

    “…Buffer overflows are known as the most widely used and the oldest forms of attacks used by attackers to gain access for remote code execution and similar…”
    Get full text
    Conference Proceeding
  3. 3

    Optimal Band Selection and Scale based Feature Selection for Hyper Spectral Image Classification using Hybrid Neural Network by Jeenath Shafana, N, K T, Jayan, Divagar Iyyappan, R

    “…The use of hyper spectral remote sensing to categorize images has been a popular study topic. Non-linear features and high dimensionality are common in Hyper…”
    Get full text
    Conference Proceeding
  4. 4

    Machine Learning Algorithms to Evaluate Fuzzy Logic Web Services for Monitoring the Real-Time Applications by Shafana, N. Jeenath, Gowri, V., Aarthi, B., Mohan, Aswathy, Swaminathan, G. Aravind

    “…Most people, particularly those above the age of 65, are vulnerable to serious injury as a result of fall. Usually, falls go unreported and are dismissed as an…”
    Get full text
    Conference Proceeding
  5. 5

    Automated Tools and Techniques in Vulnerability Assessment by Mohan, Aswathy, Swaminathan, G Aravind, Shafana, N. Jeenath

    “…Penetration Testing in Ethical Hacking is one of the most efficient method used by high end organizations to overcome this data threat caused by cyber…”
    Get full text
    Conference Proceeding