Sharfuddin Waseem Mohammed
YOU?
Author Swipe
View article: Research on SQL Injection Attacks using Word Embedding Techniques and Machine Learning
Research on SQL Injection Attacks using Word Embedding Techniques and Machine Learning Open
Most of the damage done by web application attacks comes from SQL injection attacks, in which the attacker(s) can change, remove, and read data from the database servers. All three tenets of security— confidentiality, integrity, and availa…
View article: Recommendation of Algorithm for Efficient Retrieval of Songs from Musical Dataset
Recommendation of Algorithm for Efficient Retrieval of Songs from Musical Dataset Open
Now-a-days, the research is more towards the entertainment like music, songs, movies, etc. There are many existing works that suggest good songs, movies to people depending on their mood, nature and time that has been savior for the societ…
View article: A bi-directional Long Short-Term Memory-based Diabetic Retinopathy detection model using retinal fundus images
A bi-directional Long Short-Term Memory-based Diabetic Retinopathy detection model using retinal fundus images Open
Images of the retina are widely used for diagnosing fundus disease. Low-quality retinal photos make it hard for computer-aided diagnosis systems and ophthalmologists to make a clinical diagnosis. In ophthalmology, precision medicine is bas…
View article: A Comprehensive Literature Review on Convolutional Neural Networks
A Comprehensive Literature Review on Convolutional Neural Networks Open
From their initial days, the fields of computer vision and image processing have been dealing with visual recognition problems. Convolutional Neural Networks (CNNs) in machine learning are deep architectures built as feed-forward neural ne…
View article: A Comprehensive Literature Review on Convolutional Neural Networks
A Comprehensive Literature Review on Convolutional Neural Networks Open
From their initial days, the fields of computer vision and image processing have been dealing with visual recognition problems. Convolutional Neural Networks (CNNs) in machine learning are deep architectures built as feed-forward neural ne…
View article: Recognition of Yoga Asana from Real-Time Videos using Blaze-pose
Recognition of Yoga Asana from Real-Time Videos using Blaze-pose Open
Yoga is a broad concept that connotes union.Considering yoga's spiritual and health benefits, it is now practiced by millions of people worldwide.This paper proposes a lightweight and robust architecture that could recognize yoga asana fro…
View article: RETRACTED ARTICLE: Prediction and detection of breast cancer text data using integrated EANN and ESVM techniques
RETRACTED ARTICLE: Prediction and detection of breast cancer text data using integrated EANN and ESVM techniques Open
View article: A Novel Geometrical Scale and Rotation Independent Feature Extraction Technique for Multi-lingual Character Recognition
A Novel Geometrical Scale and Rotation Independent Feature Extraction Technique for Multi-lingual Character Recognition Open
This paper presents a novel geometrical scale and rotation independent feature extraction (FE) technique for multi-lingual character recognition (CR). The performance of any CR techniques mainly depends on the robustness of the proposed FE…
View article: A Neural Network Model for Attacker Detection using GRU and Modified Kernel of SVM
A Neural Network Model for Attacker Detection using GRU and Modified Kernel of SVM Open
over past few decades neural network changed the way of traditional computing many different models has proposed depending upon data intensity, predictions, and recognition and so on. Among which Gated Recurrent Unit (GRU) is created for v…
View article: An Efficient Approach for Motion Detection in Video Surveillance and Enhance the Video Quality
An Efficient Approach for Motion Detection in Video Surveillance and Enhance the Video Quality Open
In recent studies video surveillance become an important task for identifying the motion detection (moving objects) to avoid the burglars in home security systems. Most of the video surveillance systems works on algorithms like background …