About
23
Publications
10,574
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
57
Citations
Introduction
Current institution
Additional affiliations
June 2011 - present
June 2011 - present
Education
June 2009 - June 2011
Publications
Publications (23)
Biomedical Event Extraction (BEE) is a demanding and prominent technology that attracts the researchers and scientists in the field of natural language processing (NLP). The conventional method relies mostly on external NLP packages and manual designed features, where the features engineering is complex and large. In addition, the conventional meth...
Detection of molecular level biomedical event extraction plays a vital role in creating and visualizing the applications related to natural language processing. Cystic Fibrosis is an inherited genetic and debilitating pathology involving the respiratory and digestive systems. The excessive production of thick sticky mucus on the outside of the cell...
Internet of Things provides a way to contribute to human society. IoT can be used for monitoring and alerting human
health. Sensors play a major role in every IoT applications. The data obtained through sensors of health care applications should be accumulated and progressed for further analysis. Data density increases complexity for development
an...
Object recognition by the blind people often requires a manual intervention more which is more difficult to perform. In this proposed design, automated prediction of objects has been implemented to enhance the visually impaired people communication. In order to solve the common aiming problem for blind users, a motion-based method to detect the obj...
Abstract: In the changing environment, globalization hales the education systems to have various changes of education, and one of them is Distance Education. Today distance education is a most important choice for those people who need the chance to concentrate the traditional system of education, due to constraints in time, space, and money that t...
Automated identification of facial expression has become necessary for the subject of psychological phenomena and the development of human being-computing machine interaction (HCI).In addition to that it also plays an integral part of computer visual sensation research. Automated recognition of facial reflection also helps to create applications th...
Wireless sensor networks are more susceptible to various attacks due to the deployment in aggressive environment. These networks offer the promise of exciting new technological developments. They are emerging as one of the most reliable technologies for implementing ubiquitous computing ultimately leading to an all-pervasive paradigm of computing i...
One of the common causes of blindness is Diabetic retinopathy. This disease threatens the visions of a lot of people affected with diabetes in the world. This is an important eye disease that may lead to blindness or may blur the visions. In this work, an attempt has been made to examine retinal images for Content Based Image Retrieval (CBIR) appli...
Nowadays wireless networks are fast, becoming more secure than their wired counterparts. Recent technological advances in wireless networking, IC fabrication and sensor technology have lead to the emergence of millimetre scale devices that collectively form a Wireless Sensor Network (WSN) and are radically changing the way in which we sense, proces...
Decision making is a sub-discipline of operation research. Multi criteria decision making is one of the important method which plays a vital role in day today life. The Technique for Order Preference by Similarity Ideal Solution (TOPSIS) is one of the best approaches for such multi criteria decision making problem. So, the aim of this paper is to e...
Network monitoring tools are designed to analyze the network traffic status. Network transaction information is observed from the frame headers. Data transmission, communication and computational overheads are analyzed from the network monitoring tools. Network load deviation estimation is a complex task. K-means clustering algorithm is used to est...
Content based image retrieval is a mainstay of image retrieval systems. This technique is incorporated in the analysis of disease
identification in the medical field. Incorporating content based image retrieval with the medical field in the identification of
multiple diseases is the main motto of this paper. Usually doctors take scan report which i...
By the explosive development of internet and the reckless communication techniques in current years the security and the confidentiality of the data has become the prime importance. To guard the data from illegal access and interfering various methods for data hiding like cryptography, hashing, confirmation have been developed and are in practice t...
Machine Translation is an essential approach for localization, and is especially appropriate in a linguistically diversenation like India. Automatic translation between languages which are morphologically rich and syntactically different is generally regarded as a complex task. A number of machine translation systems have been proposed in literatur...
Nowadays, Continuous Speech Recognition (CSR) deals with developing a healthy approach, which can handle changeability in environment, utterance, speaker and language. CSR has been created for numerous languages because each language has its own specific features. This research work mainly focuses on developing a recognition system for Dravidian la...
ABSTRCT In this proposed work, word reordering rules for English to Dravidian languages Machine Translation System is developed. Machine Translation (MT) mainly deals with the transformation of text from one natural language to another. Generally in Machine translation, the transformation hypothesis is computationally expensive. If we perform arbit...
A novel technique is presented to design the signal subspace speech enhancement based on perceptual post filtering. Firstly, by subspace filter the noisy speech is enhanced. The underlying principle is to decompose the vector space of the noisy signal into a signal plus noise subspace and a noise subspace. The decomposition can theoretically be per...
Questions
Question (1)
please are you able to explain in Tamil then you may explain in it I requested language