M. V. Varsha

Learn More
In this paper, we propose a statistical approach for smartphone malware detection. A set of features such as hardware, permission, application components, filtered intents, opcodes and strings are extracted from the samples to form a vector space model. Feature selection methods such as Entropy based Category Coverage Difference (ECCD) and Weighted Mutual(More)
— Image fusion is the process of combining two or more images with specific objects with more clarity. It is common that in focusing one object remaining objects will be less highlighted. Hence to get an image highlighted in all regions, a different means is required. This is what is done by the Image Fusion. In remote sensing, the increasing availability(More)
In recent years, data mining has become one of the most popular techniques for data owners to determine their strategies. Association rule mining is a data mining approach that is used widely in traditional databases and usually to find the positive association rules. However, there are some other challenging rule mining topics like negative association(More)
Compressing an image is significantly different than compressing raw binary data. Of course, general purpose compression programs can be used to compress images, but the result is less than optimal. The compression is achieved by many algorithms like Haar, EZW, JPEG2000 and SPIHT [4] and we can get some good results but more efficient algorithm is required(More)
  • 1