
Dr. RM Chandrasekaran- M.E., M.B.A., Ph.D.
- Professor (Full) at Annamalai University
Dr. RM Chandrasekaran
- M.E., M.B.A., Ph.D.
- Professor (Full) at Annamalai University
About
75
Publications
56,416
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,748
Citations
Introduction
Dr. RM Chandrasekaran currently works at the Department of Computer Science and Engineering, Annamalai University. Dr. does research in Information Systems (Business Informatics), Software Engineering and Data Mining. Their current project is 'Sentiment mining'.
Current institution
Additional affiliations
November 1990 - present
Publications
Publications (75)
Soft computing techniques are effective techniques that are used in prediction of noise in the dataset which causes misclassification. In classification, it is expected to have perfect labeling, but the noise present in data has impact on the label mapped and influences the input values by affecting the input feature values of the instances. Existe...
Wireless networks have emerged as a key enabling technology, expanding rapidly and offers numerous potential applications. The security issues have to be adequately addressed to realize the potential of multi-hop cooperative wireless network scenarios. The open nature of the wireless network is the opportunity for invaders launching various attacks...
Student performance prediction is an area of concern for educational institutions. At the University level learning system, the method or rule adopted to identify the candidates who pass or fail differs depending on various factors such as the course, the department of study and so on. Predicting the result of a student in a course is an issue that...
Sentiment analysis of product reviews is an attracting and increasing interest in the area of natural language processing and web text mining. Objective is to analyze the effect of ANN based method for opinion classification. In the research that has done so far on sentiment analysis, ANNs have been considered rarely. In this work, the probabilisti...
Opinion mining is a very challenging problem, since user generated content is described in various complex ways using natural language. In opinion mining, most of the researchers have worked on general domains such as electronic products, movies, and restaurants reviews but not much on health and medical domains. Patients using drugs are often look...
In telecommunication industry satisfying customers' needs plays a vital role to retain them within their network for longer duration of time. A well-known fact in the telecommunication industry is that the competition among industries is very fierce. The acquisition of new and resourceful customers has become difficult and often very expensive. Sub...
Emerging technologies in online commerce, mobile and customer experience have transformed the retail industry so as to enable the marketers to boost sales and the customers with the most efficient online shopping. Online reviews significantly influence the purchase decisions of buyers and marketing strategies employed by vendors in e-commerce. Howe...
The recent blast of dataset size, in number of records and in addition of attributes, has set off the improvement of various big data platforms and in addition parallel data analytic algorithms. In the meantime however, it has pushed for the utilization of data dimensionality reduction systems. Mobile Telecom Industry competition has become more an...
In telecommunication industry satisfying customers’ needs plays a vital role to retain them within their network for longer duration of time. A well-known fact in the telecommunication industry is that the competition among industries is very fierce. The acquisition of new and resourceful customers has become difficult and often very expensive. Sub...
The aim of sentiment classification is to efficiently identify the emotions expressed in the form of text messages. Machine learning methods for sentiment classification have been extensively studied, due to their predominant classification performance. Recent studies suggest that ensemble based machine learning methods provide better performance i...
The objective of this paper is to design a unique system that helps to diagnose risk levels in the prediction of potential diabetics among pregnant women using Supervised Machine Learning techniques of data mining. Primary as well as secondary data needed for this paper were collected using data collection methods namely questionnaire, survey of me...
Objective: The aim of this paper is to design and implement an expert clinical system to diagnose the type of diabetes and the levels of risk among diabetic patients using the data mining techniques clustering and classification. Methods: The research design made use of primary and secondary data and the data were collected using data collection to...
Faults in a module tend to cause failure of the software product. These defective modules in the software pose considerable risk by increasing the developing cost and decreasing the customer satisfaction. Hence in a software development life cycle it is very important to predict the faulty modules in the software product. Prediction of the defectiv...
The rapid growth of online social media acts as a medium where people contribute their opinion and emotions as text messages. The messages include reviews and opinions on certain topics such as movie, book, product, politics and so on. Opinion mining refers to the application of natural language processing, computational linguistics, and text minin...
This paper deals with the balanced allocation of customers to multiple distribution centers. Allocation problem generally deals with clustering of customers so as to achieve minimum total resource viz. cost or time. But the real challenge arises when it is required to strike a balance between the allocation while also minimizing the total cost or t...
With the rapid growth of social networks, opinions expressed in social networks play an influential role in day-to-day life. A need for a sentiment mining model arises, so as to enable the retrieval of opinions for decision making. Though support vector machine (SVM) has been proved to provide a good classification result in sentiment mining, the p...
More people are buying products online and expressing their opinions on the products through online reviews. Sentiment analysis is used to extract opinion related information from reviews, and the extracted results can benefit both consumers and manufacturers. Much work on machine learning based sentiment classification; work has been carried out o...
With the rapid expansion of e-commerce over
the decades, more and more product reviews emerge on
e-commerce sites. In order to effectively utilize the information
available in the form of reviews, an automatic
opinion mining system is needed to organize the reviews
and to help the users and organizations in making an
informed decision about the pro...
With the rapid expansion of e-commerce over the decades, the growth of the user generated content in the form of reviews is enormous on the Web. A need to organize the e-commerce reviews arises to help users and organizations in making an informed decision about the products. Opinion mining systems based on machine learning approaches are used onli...
Data Mining is the use of algorithms to extract the information and patterns derived by the knowledge discovery in database process. It is often referred to as supervised learning because the classes are determined before examining the data. In many data mining applications that address classification problems, feature and model selection are consi...
Manet is an anthology of mobile nodes with moving sense and can communicate to each other with wireless links without any infrastructure or centralized administration. Manet has to face many challenges in various aspects; one of the further most challenges is terrain size and node placement. In this paper some of the node placement types are analyz...
Sentiment Analysis is the computational study of sentiments expressed in the form of text messages (online reviews). The rapid growth of review sites in recent years leads too much of the work to be focused on sentiment classification. The goal of sentiment analysis is to classify whether a text is having positive or negative sentiment. The use of...
Sentiment classification attempts to identify the sentiment polarity of a given text as either positive or
negative. Much of the work has been focused on Sentiment classification using machine learning methods in last
decades. Analyzing and predicting the polarity of the sentiment plays an important role in decision making.
Related work about hybri...
The transition from Web 2.0 to Web 3.0 has resulted in creating the dissemination of social communication without limits in space and time. Sentiment analysis has really come into its own in the past couple of years. It's been a part of text mining technology for some time, but with the rise in social media popularity, the amount of unstructured te...
Online product reviews is considered as a major informative resource which is useful for both customers and manufacturers. The online reviews are unstructured-free-texts in natural language form. The task of manually scanning through huge volume of review is very tedious and time consuming. Therefore it is needed to automatically process the online...
Customer Relationship Management helps telecommunication companies to focus on different marketing strategies for retaining their customers. Companies realized the importance of well managing their relationship with customers. Mobile telecommunication market is very competitive because customers are tending to move from one company to another easil...
Communication paved a vital role in this modern world of society. Mobile communication has become a commonly used communication vehicle for each person. Mobile usage known as Mobile Call Detail Record (MCDR) collected by operator contains information like Voice Call, Text Message, Video Calls, and other Data Services. Modeling focuses mainly on ext...
Defective modules in the software pose considerable risk by decreasing customer satisfaction and by increasing the development and maintenance costs. Therefore, in software development life cycle, it is essential to predict defective modules in the early stage so as to improve software developers' ability to identify the defect-prone modules and fo...
Mobile Ad-hoc Networks (MANETs) is a network without a fixed Infrastructure. In wireless networks users expect to get access to the network security and to exchange information anytime and anywhere. The ad hoc wireless network consists of mobile networks which creates architecture for communication without the help of traditional fixed-position rou...
Data Mining is the use of algorithms to extract the information and patterns derived by the knowledge discovery in database process. It is often referred to as supervised learning because the classes are determined before examining the data. In many data mining applications that address classification problems, feature and model selection are consi...
Data Mining is the use of algorithms to extract the information and patterns derived by the knowledge discovery in database process. It is often referred to as supervised learning because the classes are determined before examining the data. In many data mining applications that address classification problems, feature and model selection are consi...
Every mobile operator of today’s world switches their technology over from 2G (second generation) to 3G (third generation) network. Operators are keen analyzing their CDR (call detail record) obtained over the past usage for predicting the behavior of their customers and their usage. The operators are willing to mine knowledge from real-world datas...
AWireless SensorNetworks (WSNs)consist of spatially distributed autonomous
sensors to cooperatively monitor physical or environmental conditions, such as temperature,
sound, vibration, pressure, motion or pollutants. WSNs are more vulnerable to attacks and
failures due to the involvement of many numbers of tiny sensor nodes. As the technology is
tr...
Due to the sheer volume of opinion rich web resources such as discussion forum, review sites , blogs and news corpora available in digital form, much of the current research is focusing on the area of sentiment analysis. People are intended to develop a system that can identify and classify opinion or sentiment as represented in an electronic text....
In the past few decades Voice over internet protocol (VoIP) is gaining a lot of attention due to the tremendous growth of the public internet leading the way into the IP world of communication. The performance degradation of the 802.11(a/b/g) standards is mainly due to channel utilization, contention delays and collisions. The intension of this pap...
In today’s world, every Mobile operator is switching over from Second Generation (2G) to Third Generation (3G) network and they are keen on analyzing the behavior of their customers using their Call Detail Record (CDR) obtained over the past usage. They are willing to mine knowledge from real-world dataset which implies the pattern of user mentalit...
This paper deals with the identification of mobile customers willing to switch over to the next generation of Mobile 3G services and willing to retain their existing 3G services. Mobile operators are now switching from Second Generation (2G) to Third Generation (3G) network. They have a massive set of data called Call Detail Record Set (CDRS) conta...
Clustering provides an effective way to improve the lifetime in Wireless Sensor Network (WSN) environment. Clustering protocols in WSN requires optimal grouping for cluster heads which further leads to inter cluster communication in reliable manner. In this study, Lack of Power Avoidance (LoPA) protocol is proposed and evaluated. By using heuristic...
This paper proposes a two stage approach for extracting and recognizing text in images. This approach uses Morphological operation for text localization, and, Support Vector Machine for character recognition, along with some preprocessing and post processing steps. This algorithm is tested with natural Images as well as Images taken from ICDAR 2003...
A mobile ad hoc network is a wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control. The wireless and distributed nature of mobile ad hoc networks poses greater challenges like security, mobility, scalability, reliability and other attributes of trust worthy communication. In this paper we...
Mobile ad-hoc networks (MANETs) are autonomous, self-configuring and dynamic networks that operate without the support of any fixed infrastructure. Such networks are excellent candidates for military logistics which requires identification of location of sensitive frights and other communication need. Ad hoc routing protocol supports nodes mobility...
Data mining is the use of algorithms to extract the information and patterns derived by the knowledge discovery in databases process. Classification is a very common data mining task. Classification maps data into predefined groups or classes. It is often referred to as supervised learning because the classes are determined before examining the dat...
This paper describes the concepts of Relay node characteristics, various deployment methods, and their internal behaviors in the Wireless Sensor Networks (WSN). First, the internal behavioral characteristics of relay node and their different state processing are analyzed using algorithm. Then, the influence of relay nodes in WSN and the potential r...
Data Mining is the use of algorithms to extract the information and patterns derived by the knowledge discovery in databases process. Classification maps data into predefined groups or classes. It is often referred to as supervised learning because the classes are determined before examining the data. The Verification of handwritten Signature, whic...
Wireless Sensor Networks (WSN) is neoteric progressing technology which addresses solutions to critical application environments. It allows the assimilation of medical sensors to form a group scenario which makes it feasible to remotely collect and communicate the physiological signals of a patient, thus preventing the patient from being tied to a...
Machine vision for industry has generated a great deal of interest in the technical community over the past several years. Extensive research has been performed on machine vision applications in manufacturing, because it has the advantage of being non-contact and as well faster than the contact methods. Using Machine Vision, it is possible to evalu...
The explosive growth in the use of real-time multimedia applications in mobile devices requires quality of service (QoS) support for effective communication. Network congestion is the main reason for packet loss, longer delay and jitter in streaming multimedia applications. Most of the present routing protocols are not designed to adapt congestion....
The growth of internet over the years has generated greater interest in e-Learning as a tool for bringing the training to the learner’s door step. Well-designed e-Learning can offer the right mix of text, audio and video content to enhance the understanding of the learner. This paper investigates the impact of learner’s primary medium of instructio...
The success of MANET will depend on its ability to support existing, applications and protocols. Such a dynamic setting poses
fabulous design challenges at each layer of the network. Hence this paper proposes a new concept of Blending Routing Protocols
(BRP) in MANET which provides the advantages of the three types of routing protocols and addresse...
e-Learning system emphasizes on the available content to all learners irrespective of their knowledge level and relevance. This paper concentrates on the result oriented investigation of the impact of learner’s primary medium of instruction (MI) at school in understanding the content given to them in English and proposes a design for developing an...
Web Based Query Management System (WBQMS) is a methodology to design and to implement Mobile Business, in which a server is the gateway to connect databases with clients which sends requests and receives responses in a distributive manner. The gateway, which communicates with mobile phone via GSM Modem, receives the coded queries from users and sen...
Voice over Internet protocol (VoIP) is one of the most important applications for the IEEE 802.11 wireless local area networks (WLANs). For network planners who are deploying VoIP over WLANs, one of the important issues is the VoIP capacity. VoIP bandwidth consumption over a WAN is one of the most important factors to consider when building a VoIP...
Text data mining is a process of exploratory data analysis. Classification maps data into predefined groups or classes. It is often referred to as supervised learning because the classes are determined before examining the data. This paper describes the proposed k-Nearest Neighbor classifier that performs comparative cross-validation for the existi...
Wireless sensor network (WSN) is a collection of sensor nodes which are randomly deployed in distributed environment. Fault
detection and management is major criteria in wireless sensor networks. Cross layer approach is used to implement Fault management
plane in wireless sensor networks. Cross-layer approach (XLA) is developed, which replaces the...
Wireless Sensor Networks (WSN) is a collection of numerous tiny sensor nodes which are randomly deployed in distributed environment. The reliability of WSN is affected by faults that may occur due to various reasons. The Fault Tolerance is the key factor for distributed sensor application. The main objective of this paper is to create an algorithm...
A mobile ad hoc network is a kind of wireless communication network that does not rely on a fixed infrastructure and is lack
of any centralized control. The wireless and distributed nature of Manet poses greater challenges of the system and networks
for fruitful working are scalability, mobility, security, reliability and other attributes of trust...
The dynamic topological change in mobile ad hoc networks hinders the possibility of predicting the behavior under different communication and data transfer requirements. In this paper, a detailed analysis and interpretation was made by simulating the network with DSR protocol, specifically for streaming multimedia applications, under different scen...
Student performance in University courses is of great concern to the higher education managements where several factors may affect the performance. Data mining techniques are used to analyze the course preferences and course completion rates of enrollees in different Institutions in a Technical University. Courses were classified into three broad g...
This paper proposes a new technique based on nonlinear Adaptive Median filter (AMF) for image restoration. Image denoising is a common procedure in digital image processing aiming at the removal of noise, which may corrupt an image during its acquisition or transmission, while retaining its quality. This procedure is traditionally performed in the...
Data mining is the use of algorithms to extract the information and patterns derived by the knowledge discovery in databases process. Classification maps data into predefined groups or classes. It is often referred to as supervised learning because the classes are determined before examining the data. In many data mining applications that address c...
Mobile wireless ad hoc networks are infrastructureless and often used to operate under unattended mode. So, it is significant in bringing out a comparison of the various routing protocols for better understanding and implementation of them. In this paper, we studied and compared the performance of various routing protocols like Ad hoc On-Demand Vec...
Present day mobile ad hoc networks grow in size and the associated complexity warrant the need to explore the suitability of the various application traffics and their repeatability during their execution. This paper presents a study on the timing analysis and their repeatability for common MANET (mobile ad hoc network) application traffics in larg...
Text data mining is a process of exploratory data analysis. Classification maps data into predefined groups or classes. It is often referred to as supervised learning because the classes are determined before examining the data. This paper describes proposed radial basis function Classifier that performs comparative cross- validation for existing r...
Traditionally, the authentication protocols for cellular telephone networks have been designed for device authentication rather than user authentication, which bring certain limitations and restrictions on the functionality of the system. In this paper we propose a user authentication protocol for the Global System for Mobile communications (GSM) w...
Cryptography is one of the most important areas in the computer industry. Encryption allows an application to secure its data from being accessed by hackers. This paper developed and designed an algorithm for encryption and decryption. Cryptography provides many methods and techniques for secure communication. Currently there are many industry stan...
The prediction of performance in Manet (mobile ad-hoc network) used to improve the technology development. The proposed analysis used how to design a network according to the applications of mobile adhoc network experiments with different workloads. This paper shows the variations of any parameter must affect the performance of mobile adhoc network...
Text Mining is around applying knowledge discovery techniques to unstructured text is termed knowledge discovery in text (KDT), or Text data mining or Text Mining. In Neural Network that address classification problems, training set, testing set, learning rate are considered as key tasks. That is collection of input/output patterns that are used to...
Data Mining is the use of algorithms to extract the information and patterns derived by the knowledge discovery in databases process. Classification maps data into predefined groups or classes. It is often referred to as supervised learning because the classes are determined before examining the data. This paper addresses an ensemble approach of ge...