Menu
Subject Details
Dept     : CSE-IOT
Sem      : 7
Regul    : 2019
Faculty : RR.Kmalakkannan
phone  : NIL
E-mail  : kamalakannan.r.iot@snsce.ac.in
293
Page views
33
Files
2
Videos
0
R.Links

Icon
Announcements

  • Puzzles

    Dear Students the Puzzles has been uploaded for the following topics:</br>Design principles of pattern recognition system

  • Assignment

    Assignment topic is Assignment 2: Malware Identification and Classification and due date is 19-09-2024.

  • Assignment

    Assignment topic is Assignment 1: Static vs. Dynamic Analysis and due date is 16-09-2024.

  • Question Bank

    Dear Students the Question Bank has been uploaded for the following topics:</br>Design principles of pattern recognition system

  • Assignment

    Assignment topic is Assignment 1: Static vs. Dynamic Analysis and due date is 31-08-2024.

  • Assignment

    Assignment topic is Assignment 1: Static vs. Dynamic Analysis and due date is .

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:</br>Introduction, </br>Bayesian Decision Theory Continuous Features, </br>Minimum error rate- classification- classifiers, </br>discriminant functions, and decision surfaces, </br>The normal density- Discriminant functions, </br>Discriminant functions for the normal density Maximum likelihood estimation., </br>Density Estimation - Parzen Windows , </br>K-Nearest Neighbor Estimation - Nearest Neighbor Rule, </br>Fuzzy clustering. NonMetric Methods, </br>Introduction-Decision Trees- CART, </br>Other Tree Methods Recognition with Strings, </br>Netflow analyzer., </br>Anomaly detection– data driven methods , </br>feature engineering – detection with data and algorithms , </br>challenges using ML- response and mitigation , </br>Malware Analysis: defining

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:</br>Basics of pattern recognition, </br>Design principles of pattern recognition system, </br>Learning and adaptation, </br>Pattern recognition approaches.

  • Grades & Toppers of IAE1

    &nbsp;<div id="maingrade"> <div id="photor"><img src="files/CW_66a7486ab88f1/gradesimg/WhatsApp Image 2024-10-09 at 10.11.30 AM.jpeg" width="47" height="52" class="roundnews1" /></div> <div id="gratitile">Sujitha S </div> <div id="grdm">1</div> </div><div id="maingrade"> <div id="photor"><img src="files/CW_66a7486ab88f1/gradesimg/WhatsApp Image 2024-10-09 at 10.11.12 AM.jpeg" width="47" height="52" class="roundnews1" /></div> <div id="gratitile">Manju K </div> <div id="grdm">2</div> </div><div id="maingrade"> <div id="photor"><img src="files/CW_66a7486ab88f1/gradesimg/WhatsApp Image 2024-10-04 at 10.35.44 AM.jpeg" width="47" height="52" class="roundnews1" /></div> <div id="gratitile">CHANDRAKANTH </div> <div id="grdm">2</div> </div>

  • Grades & Toppers of IAE1

    &nbsp;<div id="maingrade"> <div id="photor"><img src="files/CW_66a7486ab88f1/gradesimg/WhatsApp Image 2024-10-09 at 10.11.30 AM.jpeg" width="47" height="52" class="roundnews1" /></div> <div id="gratitile">Sujitha S </div> <div id="grdm">1</div> </div><div id="maingrade"> <div id="photor"><img src="files/CW_66a7486ab88f1/gradesimg/WhatsApp Image 2024-10-09 at 10.11.12 AM.jpeg" width="47" height="52" class="roundnews1" /></div> <div id="gratitile">Manju K </div> <div id="grdm">2</div> </div><div id="maingrade"> <div id="photor"><img src="files/CW_66a7486ab88f1/gradesimg/WhatsApp Image 2024-10-04 at 10.35.44 AM.jpeg" width="47" height="52" class="roundnews1" /></div> <div id="gratitile">CHANDRAKANTH </div> <div id="grdm">2</div> </div>

  • Youtube Video

    Dear Students the Youtube Video has been uploaded for the following topics:</br>Introduction to PRT</br>Principles of PRT

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:</br>feature generation – classification, </br>Network Traffic Analysis, </br>Facing the Cybercrime Problem Head-on, </br>Emerging Cybercrime Techniques, </br>Understanding the People on the Scene, </br>The Computer Investigation Process, </br>Acquiring Data, Duplicating Data, and Recovering Deleted Files, </br>Understanding Network Intrusions and Attacks.