{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:51:11Z","timestamp":1757631071051,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,5]],"date-time":"2021-04-05T00:00:00Z","timestamp":1617580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,5]]},"DOI":"10.1145\/3460620.3460623","type":"proceedings-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T10:33:05Z","timestamp":1622802785000},"page":"12-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Detection of Text from Video with Customized Trained Anatomy"],"prefix":"10.1145","author":[{"given":"Manasa Devi","family":"Mortha","sequence":"first","affiliation":[{"name":"JNTUH, India"}]},{"given":"Seetha","family":"Maddala","sequence":"additional","affiliation":[{"name":"GNITS, India"}]},{"given":"Vishwanadha","family":"Raju","sequence":"additional","affiliation":[{"name":"JNTUH, India"}]}],"member":"320","published-online":{"date-parts":[[2021,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234698.3234735"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330431.3330458"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"S.A. Aljawarneh V. Radhakrishna and G.R. Kumar. 2018. A fuzzy measure for intrusion and anomaly detection. Proceedings - 2017 International Conference on Engineering and MIS ICEMIS 2017 2018-January(2018) 1\u20136. https:\/\/doi.org\/10.1109\/ICEMIS.2017.8273113 Conference of 2017 International Conference on Engineering and MIS ICEMIS 2017 ; Conference Date: 8 May 2017 Through 10 May 2017; Conference Code:134460.","DOI":"10.1109\/ICEMIS.2017.8273113"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"S. Aljawarneh V. Radhakrishna and G.R. Kumar. 2019. An imputation measure for data imputation and disease classification of medical datasets Gaidan\u00a0I. Ahad\u00a0I.U. (Ed.). AIP Conference Proceedings 2146 (2019). https:\/\/doi.org\/10.1063\/1.5123688 Conference of 1st International Conference on Key Enabling Technologies KEYTECH 2019 ; Conference Date: 24 April 2019 Through 26 April 2019; Conference Code:150894.","DOI":"10.1063\/1.5123688"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330431.3330457"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.5123688"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330431.3330457"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745355"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3279996.3280021"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3279996.3280025"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10699-019-09594-8"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2017.8273100"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3776-7"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2017.8273113"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2397-3"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.01.013"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219861"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745352"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2017.8273101"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33266-1_22"},{"key":"e_1_3_2_1_21_1","volume-title":"WordSup: Exploiting Word Annotations for Character based Text Detection. arXiv:1708.06720 [cs] (Aug","author":"Hu Han","year":"2017","unstructured":"Han Hu, Chengquan Zhang, Yuxuan Luo, Yuzhuo Wang, Junyu Han, and Errui Ding. 2017. WordSup: Exploiting Word Annotations for Character based Text Detection. arXiv:1708.06720 [cs] (Aug. 2017). http:\/\/arxiv.org\/abs\/1708.06720 arXiv:1708.06720."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2011.6014017"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACTE.2010.5579518"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/NUICONE.2012.6493221"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJITWE.2019100102"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","unstructured":"G.R. Kumar N. Mangathayaru and G. Narasimha. 2015. An approach for intrusion detection using text mining techniques. ACM International Conference Proceeding Series 24-26-September-2015 (2015). https:\/\/doi.org\/10.1145\/2832987.2833076 Conference of 2015 International Conference on Engineering and MIS ICEMIS 2015 ; Conference Date: 24 September 2015 Through 26 September 2015; Conference Code:119163.","DOI":"10.1145\/2832987.2833076"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","unstructured":"G.R. Kumar N. Mangathayaru and G. Narsimha. 2016. An approach for intrusion detection using fuzzy feature clustering. Proceedings - 2016 International Conference on Engineering and MIS ICEMIS 2016 (2016). https:\/\/doi.org\/10.1109\/ICEMIS.2016.7745345 Conference of 2016 International Conference on Engineering and MIS ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.","DOI":"10.1109\/ICEMIS.2016.7745345"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234698.3234733"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","unstructured":"G.R. Kumar N. Mangathayaru G. Narsimha and G.S. Reddy. 2018. Evolutionary approach for intrusion detection. Proceedings - 2017 International Conference on Engineering and MIS ICEMIS 2017 2018-January(2018) 1\u20136. https:\/\/doi.org\/10.1109\/ICEMIS.2017.8273116 Conference of 2017 International Conference on Engineering and MIS ICEMIS 2017 ; Conference Date: 8 May 2017 Through 10 May 2017; Conference Code:134460.","DOI":"10.1109\/ICEMIS.2017.8273116"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","unstructured":"N. Mangathayaru G.R. Kumar and G. Narsimha. 2016. Text mining based approach for intrusion detection. Proceedings - 2016 International Conference on Engineering and MIS ICEMIS 2016 (2016). https:\/\/doi.org\/10.1109\/ICEMIS.2016.7745351 Conference of 2016 International Conference on Engineering and MIS ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.","DOI":"10.1109\/ICEMIS.2016.7745351"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2017.343"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2975716"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18503-3_29"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10699-019-09589-5"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2019.00141"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18476-0_30"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTE.2010.5608874"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833042"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234698.3234731"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3279996.3280026"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330431.3330459"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330431.3330463"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2017.8273097"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","unstructured":"Vangipuram Radhakrishna Shadi\u00a0A. Aljawarneh P.V. Kumar and V. Janaki. 2018. A novel fuzzy similarity measure and prevalence estimation approach for similarity profiled temporal association pattern mining. Future Generation Computer Systems 83 (June 2018) 582\u2013595. https:\/\/doi.org\/10.1016\/j.future.2017.03.016","DOI":"10.1016\/j.future.2017.03.016"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2445-y"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","unstructured":"V. Radhakrishna G.R. Kumar and S. Aljawarneh. 2015. Strategic application of software process model to optimize business intelligence results. ACM International Conference Proceeding Series 24-26-September-2015 (2015). https:\/\/doi.org\/10.1145\/2832987.2833053 Conference of 2015 International Conference on Engineering and MIS ICEMIS 2015 ; Conference Date: 24 September 2015 Through 26 September 2015; Conference Code:119163.","DOI":"10.1145\/2832987.2833053"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJIE.2017.087013"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833053"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJIE.2017.087013"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2017.8273098"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833069"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833071"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2015.7435809"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833064"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833077"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30927-9_60"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745344"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745353"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745343"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2905055.2905320"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","unstructured":"V. Radhakrishna P.\u00a0V. Kumar and V. Janaki. 2016. A Novel Similar Temporal System Call Pattern Mining for Efficient Intrusion Detection. https:\/\/doi.org\/10.3217\/jucs-022-04-0475","DOI":"10.3217\/jucs-022-04-0475"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2905055.2905287"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","unstructured":"Vangipuram Radhakrishna P.\u00a0V. Kumar and V. Janaki. 2017. A Computationally Efficient Approach for Mining Similar Temporal Patterns. In Recent Advances in Soft Computing Radek Matou\u0161ek (Ed.). Vol.\u00a0576. Springer International Publishing Cham 197\u2013208. https:\/\/doi.org\/10.1007\/978-3-319-58088-3_19","DOI":"10.1007\/978-3-319-58088-3_19"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234698.3234742"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJITWE.2019100101"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745354"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745347"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234698.3234734"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","unstructured":"Vangipuram Radhakrishna P.\u00a0V. Kumar V. Janaki and N. Rajasekhar. 2017. Estimating Prevalence Bounds of Temporal Association Patterns to Discover Temporally Similar Patterns. In Recent Advances in Soft Computing Radek Matou\u0161ek (Ed.). Vol.\u00a0576. Springer International Publishing Cham 209\u2013220. https:\/\/doi.org\/10.1007\/978-3-319-58088-3_20","DOI":"10.1007\/978-3-319-58088-3_20"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACTE.2010.5579739"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/NUICONE.2012.6493217"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2618168.2618184"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.05.017"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5185-9"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20573-6_37"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACTE.2010.5579100"},{"key":"e_1_3_2_1_77_1","volume-title":"Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks. arXiv:1506.01497 [cs] (Jan","author":"Ren Shaoqing","year":"2016","unstructured":"Shaoqing Ren, Kaiming He, Ross Girshick, and Jian Sun. 2016. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks. arXiv:1506.01497 [cs] (Jan. 2016). http:\/\/arxiv.org\/abs\/1506.01497 arXiv:1506.01497."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.358"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556871.2556933"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833075"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234698.3234737"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833073"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","unstructured":"R. Vangipuram R.K. Gunupudi V.K. Puligadda and J. Vinjamuri. 2020. A machine learning approach for imputation and anomaly detection in IoT environment. Expert Systems 37 5 (2020). https:\/\/doi.org\/10.1111\/exsy.12556","DOI":"10.1111\/exsy.12556"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12556"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10699-019-09590-y"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPRIME.2013.6496720"},{"key":"e_1_3_2_1_87_1","volume-title":"EAST: An Efficient and Accurate Scene Text Detector. arXiv:1704.03155 [cs] (July","author":"Zhou Xinyu","year":"2017","unstructured":"Xinyu Zhou, Cong Yao, He Wen, Yuzhi Wang, Shuchang Zhou, Weiran He, and Jiajun Liang. 2017. EAST: An Efficient and Accurate Scene Text Detector. arXiv:1704.03155 [cs] (July 2017). http:\/\/arxiv.org\/abs\/1704.03155 arXiv:1704.03155."}],"event":{"name":"DATA'21: International Conference on Data Science, E-learning and Information Systems 2021","acronym":"DATA'21","location":"Ma'an Jordan"},"container-title":["International Conference on Data Science, E-learning and Information Systems 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460620.3460623","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460620.3460623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:31:13Z","timestamp":1757543473000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460620.3460623"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,5]]},"references-count":87,"alternative-id":["10.1145\/3460620.3460623","10.1145\/3460620"],"URL":"https:\/\/doi.org\/10.1145\/3460620.3460623","relation":{},"subject":[],"published":{"date-parts":[[2021,4,5]]},"assertion":[{"value":"2021-06-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}