Kodhai Egambaram

Kodhai Egambaram
  • M.E(CSE)
  • Professor at Chennai Institute Of Technology

About

28
Publications
3,106
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
128
Citations
Current institution
Chennai Institute Of Technology
Current position
  • Professor

Publications

Publications (28)
Conference Paper
Handwriting Detection is a computer's approach or ability to access and interpret understandable handwritten source inputs such as paper documents, touch screens, images, etc. Recognition of handwriting is characterized as the task of turning a language into its symbolic representation represented in its spatial form of graphical marks. The progres...
Conference Paper
Full-text available
The goal to promote human limits is for Artificial Intelligence (AI). It takes a posture on public administrations, represents the increasing availability of regaining clinical data and the rapid creation of intelligent strategies. The need to stress the need to use AI in the fight against the COVID-19 crisis. The paper outlines the main role playe...
Article
This article has been withdrawn: please see Elsevier Policy on Article Withdrawal (https://www.elsevier.com/about/our-business/policies/article-withdrawal). This article has been withdrawn as part of the withdrawal of the Proceedings of the International Conference on Emerging Trends in Materials Science, Technology and Engineering (ICMSTE2K21). Su...
Article
Machine learning is one of the current technologies that use computers to perform tasks similar to humans. It is adopted in many applications like face recognition, Chabots, self-driving cars etc. This work focuses on emotion recognition which is part of computer vision technology. Emotion recognition is mainly used in cybersecurity, online shoppin...
Article
NLP can organize and structure knowledge to perform tasks such as automatic summarization, translation, named entity recognition, relationship extraction, sentiment analysis, speech recognition, and topic segmentation. By utilizing Natural Language Processing the customer experience will improve . E-mail is still the most commonly used digital cust...
Article
Full-text available
Cloud Computing has been envisioned as the next generation architecture of IT Enterprise. Cloud Computing moves the application software and databases to the large data centers, here the management of the data and services may not be fully trustworthy. Cloud offers many key features such to provide the user with the ease of use. Cloud offers two ma...
Article
A software clone is an active research area where several researchers have investigated techniques to automatically detect duplicated code in programs. However their researches have limitations either in finding the structural or functional clones. Moreover, all these techniques detected only the first three types of clones. In this paper, we propo...
Article
In mobile ad hoc networks (MANETs), All nodes are participated in packet forwarding in order to cooperate with each node. Suppose, if the nodes are not forwarding the packets to its neighbour nodes it is said be selfish node. To detect this selfish nodes many techniques has been followed. The use of watch dog is a well-known mechanism to detect sel...
Article
In the last decade, substantial research effort has been put into the detection and removal of clones from software systems; however, only few practical tools for this purpose are available for programming languages. Moreover, most methods for detecting clones are limited to a single revision of a program. This paper presents incremental clone dete...
Article
Software developers often need to examine program differences between two versions and reason about the changes. Analyzing the changes is the task. To facilitate the programmers to represent the high level source code changes, this proposed system introduces the rule-based program differencing approach to represent the changes as logical rules. Thi...
Article
In a low time to live based wireless network, the node drops all its energy before actually transferring the data given to it. This serves as a drawback where the data is not transferred completely resulting in bandwidth wastage and improper message delivery. To address this problem we formulate new routing techniques by which the data from one par...
Article
The primary objective of code clone research is to provide techniques and tools through which the topics such as clone detection and clone management. A number of techniques have been proposed for clone detections and sure to have even more detectors in future. Some limited methods have been proposed for clone modifications. A technique that helps...
Article
Software clone research has proved that there are redundancies in software. This redundancy increased the maintenance effort. For nearly past two decades a number of software clone detection techniques and clone management techniques have been proposed in the software clone research. In literature some researchers has also proposed clone management...
Article
Full-text available
Researchers focused on activities such as clone maintenance to assisttheprogrammers.Refactoring is awell-known process to improve the maintainability ofthesoftware.Program refactoring is a technique toimprove readability, structure, performance, abstraction, maintainability, or other characteristics bytransforming a program.This paper contributes t...
Article
Code Clone is a pathological form of software reuse because of its effects on the maintenance of large software systems. Probably the existing web applications use a mixture of Designing page and scripting language code as the front-end to business services. Analogously to traditional applications, redundant code is introduced by copy-and-paste pra...
Article
Copying a code fragment and reusing it by pasting with or without minor modifications is a common practice in software development environments. Various techniques have been proposed to find duplicated redundant code. Previous work was simple and practical methods for detecting exact and near miss clones over arbitrary program fragments in program...
Conference Paper
Clone Detection has considerably evolved over the last decade, leading to approaches with better results but with increasing complexity. Most of the existing approaches are limited to finding program fragments similar in their syntax or semantics, while the fraction of candidates that are actually clones and fraction of actual clones identified as...
Chapter
Over the last decade, many clone detection tools have been proposed with good results. However, these tools are still unsatisfactory and either incomplete or inefficient. In particular, the recall and precision on the average remain unresolved. We introduce, CloneManager, a tool specifically proposed for the detection of functional Code Clones and...
Article
Full-text available
Maintenance and refactoring of legacy System is difficult due to lack of necessary documents and source codes. It is a great deal to generate valuable information through refactoring. Our Objective is to develop a class diagram and sequence diagram from the binary byte code of a java legacy system and then to obtain coding from the developed diagra...
Article
Copying a code fragment and reusing it by pasting with or without minor modifications is a common practice in software development environments. As a result software systems often have sections of code that are similar, called software clones or code clones. Various techniques have been proposed to find duplicated redundant code. Most methods for d...

Network

Cited By