A survey on video summarization techniques M Kini, K Pai 2019 Innovations in Power and Advanced Computing Technologies (i-PACT) 1, 1-5, 2019 | 12 | 2019 |
Data visualization in splunk and Tableau: a case study demonstration N Balaji, BHK Pai, B Bhat, B Praveen Journal of Physics: Conference Series 1767 (1), 012008, 2021 | 10 | 2021 |
Big data integration solutions in organizations: A domain-specific analysis SD Karanam, RS Kamath, RVR Kulkarni, B Pai Data Integrity and Quality, 1-31, 2021 | 7 | 2021 |
Cyberbullying in online/E-learning platforms based on social networks N Balaji, BH Karthik Pai, K Manjunath, B Venkatesh, N Bhavatarini, ... Intelligent Sustainable Systems: Selected Papers of WorldS4 2021, Volume 2 …, 2022 | 6 | 2022 |
Mitigation and performance evaluation mechanism for selfish node attack in manets PBH Karthik, HR Nagesh, NN Chiplunkar 2017 International Conference on Computing, Communication, Control and …, 2017 | 5 | 2017 |
Detection of Epithelial Giant Cells in Nasal Aspirate Cytological Smears Using Deep Learning and Computer Vision Techniques: an Approach for Early Diagnosis of Measles Disease. AS Rao, KP BH, S Nayak, RD Shenoy Philippine Journal of Science 151, 2022 | 2 | 2022 |
Course Outcome and Programme Outcome in OBE: An Illustration in Engineering and Technology N Balaji, BHK Pai Journal of Engineering Education Transformations 33 (Special Issue), 2020 | 2 | 2020 |
Performance evaluation of various algorithms that affect fault detection in wireless sensor network S Sajan, SJ Chacko, V Pai, BHK Pai 2020 Fourth International conference on inventive systems and control (ICISC …, 2020 | 2 | 2020 |
A Review: Intrusion Detection Systems in Remote Sensor Network RC Rebello, V Pai, K Pai 2019 International Conference on Smart Systems and Inventive Technology …, 2019 | 2 | 2019 |
A Survey on Video Summarization Techniques M MK, K Pai 2019 Innovations in Power and Advanced Computing Technologies (i-PACT), 2019 | 2 | 2019 |
Detection and Performance Analysis of Various DOS Attacks under Collaborative Environment BHK Pai, HR Nagesh, N Chiplunkar Proceedings of ERCICA, 722-729, 2013 | 2 | 2013 |
Detection and performance evaluation of DoS/DDoS attacks using SYN flooding attacks KP BH, HR Nagesh, A Bhat International Journal of Computer Applications 975, 8887, 0 | 2 | |
Analysis of Routing Protocol for Low Power and Lossy Networks Attack Behavior on the Internet of Things V Pai, AS Rao, KP DS, KP BH 2022 International Conference on Artificial Intelligence and Data …, 2022 | 1 | 2022 |
Automated Detection of Anomalous Events in Surveillance Video Scenes Using Deep Learning Techniques AS Rao, KP BH, SR Rao, K Rakshitha 2023 7th International Conference on Computation System and Information …, 2023 | | 2023 |
ANN Based Weather Analysis and Prediction N Balaji, SB Bhandary, RF Dsouza, BK Pai 2022 International Conference on Distributed Computing, VLSI, Electrical …, 2022 | | 2022 |
Enhanced Processing of Input Data in Clustering Techniques of Data Mining Algorithms K Sampath Kini, BH Karthik Pai International Conference on Artificial Intelligence and Data Engineering …, 2019 | | 2019 |
Determining Frequent Item Sets using Partitioning Technique for Large Transaction Database KS Kini, KK Pai Indian Journal of Science and Technology 12, 3, 2019 | | 2019 |
Primary hyperparathyroidism presenting as bilateral genu valgum. SK Sowmini Kamath, JS Janardhan Shenoy, K Kini, KS Kishan Shetty, ... | | 2018 |
Data Visualization in Splunk and Tableau A case study demonstration B N, KP B H, B Bhat | | |
A Study of Behaviour And Performance Analysis Of Wormhole Attack In Mobile Ad-Hoc Networks KP BH, HR Nagesh, NN Chiplunkar, S Kumar | | |