Skip to main content

Showing 1–5 of 5 results for author: Shanmugapriyaa

Searching in archive cs. Search in all archives.
.
  1. Learning deep abdominal CT registration through adaptive loss weighting and synthetic data generation

    Authors: Javier Pérez de Frutos, André Pedersen, Egidijus Pelanis, David Bouget, Shanmugapriya Survarachakan, Thomas Langø, Ole-Jakob Elle, Frank Lindseth

    Abstract: Purpose: This study aims to explore training strategies to improve convolutional neural network-based image-to-image deformable registration for abdominal imaging. Methods: Different training strategies, loss functions, and transfer learning schemes were considered. Furthermore, an augmentation layer which generates artificial training image pairs on-the-fly was proposed, in addition to a loss lay… ▽ More

    Submitted 25 February, 2023; v1 submitted 28 November, 2022; originally announced November 2022.

    Comments: 14 pages, 1 figure, 4 tables

    MSC Class: I.4.9 ACM Class: I.4.9; I.5.4; J.3; J.6

    Journal ref: PLoS ONE 18(2): e0282110 (2023)

  2. BloSEn: Blog Search Engine Based On Post Concept Clustering

    Authors: S. Shanmugapriyaa, K. S. Kuppusamy, G. Aghila

    Abstract: This paper focuses on building a blog search engine which doesn't focus only on keyword search but includes extended search capabilities. It also incorporates the blog-post concept clustering which is based on the category extracted from the blog post semantic content analysis. The proposed approach is titled as "BloSen (Blog Search Engine)". It involves in extracting the posts from blogs and pars… ▽ More

    Submitted 8 October, 2013; originally announced October 2013.

    Comments: 12 pages

    ACM Class: H.3.3

    Journal ref: International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.3, September 2013

  3. arXiv:1308.1303  [pdf

    cs.DC

    Evolution of Cloud Storage as Cloud Computing Infrastructure Service

    Authors: Arokia Paul Rajan, Shanmugapriyaa

    Abstract: Enterprises are driving towards less cost, more availability, agility, managed risk - all of which is accelerated towards Cloud Computing. Cloud is not a particular product, but a way of delivering IT services that are consumable on demand, elastic to scale up and down as needed, and follow a pay-for-usage model. Out of the three common types of cloud computing service models, Infrastructure as a… ▽ More

    Submitted 5 August, 2013; originally announced August 2013.

  4. arXiv:0910.0817  [pdf

    cs.CR

    A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges

    Authors: D. Shanmugapriya, G. Padmavathi

    Abstract: Biometrics technologies are gaining popularity today since they provide more reliable and efficient means of authentication and verification. Keystroke Dynamics is one of the famous biometric technologies, which will try to identify the authenticity of a user when the user is working via a keyboard. The authentication process is done by observing the change in the ty** pattern of the user. A c… ▽ More

    Submitted 5 October, 2009; originally announced October 2009.

    Comments: 5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/

    Report number: ISSn 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 115-119, September 2009, USA

  5. arXiv:0909.0576  [pdf

    cs.CR

    A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks

    Authors: Dr. G. Padmavathi, Mrs. D. Shanmugapriya

    Abstract: Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. While the deployment of sensor nodes in an unattended e… ▽ More

    Submitted 3 September, 2009; originally announced September 2009.

    Comments: 9 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423 http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA