{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:53:30Z","timestamp":1757631210721,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,5]],"date-time":"2021-04-05T00:00:00Z","timestamp":1617580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,5]]},"DOI":"10.1145\/3460620.3460621","type":"proceedings-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T10:33:05Z","timestamp":1622802785000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Data Preprocessing for Learning, Analyzing and Detecting Scene Text Video based on Rotational Gradient"],"prefix":"10.1145","author":[{"given":"Manasa Devi Devi","family":"Mortha","sequence":"first","affiliation":[{"name":"JNTUH, India"}]},{"given":"Seetha","family":"Maddala","sequence":"additional","affiliation":[{"name":"GNITS, India"}]},{"given":"Vishwanadha","family":"Raju","sequence":"additional","affiliation":[{"name":"JNTUH, India"}]}],"member":"320","published-online":{"date-parts":[[2021,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3279996.3280025"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10699-019-09594-8"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2017.8273100"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234698.3234735"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330431.3330458"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3776-7"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2017.8273113"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.5123688"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330431.3330457"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745355"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3279996.3280021"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2397-3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.01.013"},{"volume-title":"Model and Data Engineering, Ladjel Bellatreche, \u00d3scar Pastor, Jes\u00fas\u00a0M","author":"Bilalli Besim","key":"e_1_3_2_1_14_1","unstructured":"Besim Bilalli, Alberto Abell\u00f3, Tom\u00e0s Aluja-Banet, and Robert Wrembel. 2016. Automated Data Pre-processing via Meta-learning. In Model and Data Engineering, Ladjel Bellatreche, \u00d3scar Pastor, Jes\u00fas\u00a0M. Almendros\u00a0Jim\u00e9nez, and Yamine A\u00eft-Ameur (Eds.). Springer International Publishing, Cham, 194\u2013208."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745352"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2017.8273101"},{"key":"e_1_3_2_1_17_1","unstructured":"M. Devi M. Seetha. S. Raju and D.\u00a0S. Rao. 2020. Detection and Tracking of Text from Video Using MSER and SIFT."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMTMA.2018.00117"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10593-2_33"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTE.2010.5608874"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACTE.2010.5579518"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/NUICONE.2012.6493221"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2851942"},{"key":"e_1_3_2_1_25_1","unstructured":"Tran\u00a0Ngoc Minh Mathieu Sinn Hoang\u00a0Thanh Lam and Martin Wistuba. 2018. Automated Image Data Preprocessing with Deep Reinforcement Learning. arxiv:1806.05886\u00a0[cs.CV]"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15702-8_36"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2975716"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTEICT.2016.7808140"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.466"},{"key":"e_1_3_2_1_30_1","unstructured":"Luis Perez and Jason Wang. 2017. The Effectiveness of Data Augmentation in Image Classification using Deep Learning. arxiv:1712.04621\u00a0[cs.CV]"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18476-0_30"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833042"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234698.3234731"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2017.8273097"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3279996.3280026"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2445-y"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.03.016"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330431.3330459"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330431.3330463"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833053"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJIE.2017.087013"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2017.8273098"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833069"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833071"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833064"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833077"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30927-9_60"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745344"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745353"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745343"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2905055.2905320"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2015.7435809"},{"key":"e_1_3_2_1_53_1","first-page":"475","article-title":"A novel similar temporal system call pattern mining for efficient intrusion detection","volume":"22","author":"Radhakrishna V.","year":"2016","unstructured":"V. Radhakrishna, P. Kumar, and V. Janaki. 2016. A novel similar temporal system call pattern mining for efficient intrusion detection. Journal of Universal Computer Science 22, 4 (2016), 475\u2013493. https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-84978414602&partnerID=40&md5=6bfa14df22045e36f5bf23e839dca48b","journal-title":"Journal of Universal Computer Science"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2905055.2905287"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58088-3_19"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234698.3234742"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJITWE.2019100101"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745354"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745347"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234698.3234734"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58088-3_20"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACTE.2010.5579739"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/NUICONE.2012.6493217"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.05.017"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2618168.2618184"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5185-9"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234698.3234737"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556871.2556933"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.358"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833075"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833073"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","unstructured":"R. Vangipuram R.K. Gunupudi V.K. Puligadda and J. Vinjamuri. 2020. A machine learning approach for imputation and anomaly detection in IoT environment. Expert Systems 37 5 (2020). https:\/\/doi.org\/10.1111\/exsy.12556","DOI":"10.1111\/exsy.12556"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10699-019-09590-y"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPRIME.2013.6496720"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACTE.2010.5579100"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3206025.3206051"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2366765"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2554321"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISM.2013.106"}],"event":{"name":"DATA'21: International Conference on Data Science, E-learning and Information Systems 2021","acronym":"DATA'21","location":"Ma'an Jordan"},"container-title":["International Conference on Data Science, E-learning and Information Systems 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460620.3460621","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460620.3460621","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:32:15Z","timestamp":1757543535000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460620.3460621"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,5]]},"references-count":79,"alternative-id":["10.1145\/3460620.3460621","10.1145\/3460620"],"URL":"https:\/\/doi.org\/10.1145\/3460620.3460621","relation":{},"subject":[],"published":{"date-parts":[[2021,4,5]]},"assertion":[{"value":"2021-06-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}