Saranya .K

Saranya .K
Sri Ramakrishna Institute of Technology | SRIT · computer science and engineering

M.E COMPUTER SCIENCE AND ENGINEERING

About

26
Publications
38,785
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
118
Citations
Introduction
Working under data mining of artificial intelligence. Using Soft Computing Techniques.
Additional affiliations
June 2023 - present
Sri Ramakrishna Institute of Technology
Position
  • Assistant Professor
Description
  • Researcher

Publications

Publications (26)
Article
Exploring and finding Significant features for colour visualization tasks using the EEG signals is crucial in developing a robust Brain-machine Interface (BMI). The visually evoked potential carries multiple pieces of information, and finding its best feature is a tedious task. The main objective of this research is to concentrate on various linear...
Conference Paper
Skin malignant growth is one of the most broadly perceived danger types. In the U.S. alone, over 5 million cases have been investigated every year. Melanoma is one of the most generally perceived and deadly skin dangers and incorporates the unreasonable advancement of shading-making cells. It is responsible for 4% of all harm passings and 6 out of...
Article
Full-text available
The recent advances have analyzed that is possible to decoding the multivarious aspects of visually presented stimuli from the signals of scalp EEG measurements. such multivariate methods have been commonly used to decode visual-spatial features such as location, orientation, or spatial frequency. In this project it is explained that it is possible...
Article
Full-text available
We offer a novel approach to predict the colour path utilising soft computing techniques and electroencephalogram in this study (EEG). To eliminate the effect of artefacts, the EEG response of distinct brain lobes to a colour stimulus is first recorded, and the collected EEG signals are filtered using an active band pass filter. Second, a moving wi...
Chapter
Electroencephalogram (EEG) and facial expression based emotion classification is a relatively new field in the affective computing area with challenging issues regarding the consecration of emotional states and extraction of features in order to attain optimum classification performance. Automatic emotion detection using facial expression recogniti...
Chapter
Full-text available
The electroencephalogram is a test that is used to keep track on the brain activity. These signals are generally used in clinical areas to identify various brain activities that happen during specific tasks and to design brain–machine interfaces to help in prosthesis, orthosis, exoskeletons, etc. One of the tedious tasks in designing a brain–machin...
Article
Full-text available
Safety for women has become a major issue as the day-by-day cases increasing in all over the world. This proposed project explains women's safety and their security by using an application to send alert message, showing safe location & alert authorities. It suggests a replacement view to use technology to guard women. In this project, an android ba...
Article
Full-text available
In today's world, nobody takes an initiative to seem for plant's growth from any places. Many farmers miss the knowledge about some important aspects and environmental impacts associated with the plants in their farm. Also, the farmers aren't able to keep track of their plants from any places. Managing the environmental impact of the plants manuall...
Article
Full-text available
Brain computer interface (BCI) is a system that provides a communication link between the user and their external activities without the help of their peripheral muscles and nerves. This system's efficiency purely depends on the two controllers, who send their commands via EEG and the BCI, which converts the commands into the desired action. This r...
Article
Full-text available
Internet of Things (IOT) technology has brought revolution to each and every field of common man’s life by making everything smart and intelligent. IoT refers to a network of things which make a selfconfiguring network. The development of Intelligent smart farming IOT based devices is day by day turning the face of agricultureproduction. The Object...
Article
Phishing attack is used to steal the usernameand password from the targeted user. This project proposes a mobile application prototype to detect phishing attacks using an android app called “GoUnPhish”. This prototype uses Deceptive by Deceptive approach to detect the phishing attacks. This application uses very low computation power.
Conference Paper
Full-text available
Sentiment Analysis is the way of classifying the text basedon the sentimental polarities of the opinion to find whether it is favorable, unfavorable, positive, negativeorneutral .Nowadays user rating is one of the major factorswhich influences the customer decision in selecting the product.Food recipe actually lacks the data labeling and the mechan...
Article
Full-text available
Object recognition by the blind people often requires a manual intervention more which is more difficult to perform. In this proposed design, automated prediction of objects has been implemented to enhance the visually impaired people communication. In order to solve the common aiming problem for blind users, a motion-based method to detect the obj...
Research Proposal
Full-text available
Object recognition by the blind people often requires a manual intervention more which is more difficult to perform. In this proposed design, automated prediction of objects has been implemented to enhance the visually impaired people communication. In order to solve the common aiming problem for blind users, a motion-based method to detect the obj...
Article
Full-text available
Biometric identifiers are the unique, measurable characteristics used to label and describe each person. In the past few years, Continuous Authentication system is widely used verification system in biometrics to secure personal computers. Continuous Authentication system helps the PC user to check their system continuously when third person is log...
Article
Full-text available
E-commerce Recommender system is proposed to solve Big Data problem due to huge amount of data, prevailing in many of the service recommender systems in the market. And to build scalable, efficient and precise service comparison and recommender system is highly needed. This system enables the shoppers to deeply analyses on what product to choose in...
Experiment Findings
Full-text available
E-commerce Recommender system is proposed to solve Big Data problem due to huge amount of data, prevailing in many of the service recommender systems in the market. And to build scalable, efficient and precise service comparison and recommender system is highly needed. This system enables the shoppers to deeply analyses on what product to choose in...
Research Proposal
Full-text available
E-commerce Recommender system is proposed to solve Big Data problem due to huge amount of data, prevailing in many of the service recommender systems in the market. And to build scalable, efficient and precise service comparison and recommender system is highly needed. This system enables the shoppers to deeply analyses on what product to choose in...
Article
Full-text available
Searching in web is becoming a misery for the naive people nowadays because of the information explosion across the internet. Many E-commerce websites are relying on the Recommender Systems(RS) in order to sell and gain from their products to the people(e.g Amazon, Netflix, IMDb, Yahoo). Creation of effective and accurate Recommender Systems are es...
Article
Full-text available
One of the main issue in the designing of routing protocols for Wireless sensor networks is delay efficiency due to the deficient energy resources of sensors. Behind the routing protocol design is to keep the sensors operating for as long as possible beyond the network lifetime. The delay consumption of the sensors is overhang by data transmission...
Article
Full-text available
Abstract: A brain cancer is a tissue that structured by an addition of anomalous cells and important to detect and classify brain tumors from MRI (Magnetic Resonance Imaging) for treatment. Brain tumor segmentation and classification is considered to be more important tasks in medical imaging. MRI is used for the study of the human brain. A fully a...
Conference Paper
Full-text available
Recommender Systems (RS) are the software tools that make use of the data mining techniques, in order to provide useful suggestions of items according to the user preference. The recommendation is based on the degree of utility of the user. Over 170 research articles have been published on RS until recent years and it has been gradually increasing...
Article
Full-text available
The usage of mobile technology has been vast in recent years due to its simplicity, location independence and built in applications. The performance and speed of mobile computing is considerably less when compared to the computers and powerful servers due its limited resources and compatibility issues.Inorder to overcome these obstacles and to make...
Article
Full-text available
Abstract—Data Mining is an emerging field which has attracted a large number of information industries due to huge volume of data managed in recent days. Efficient data mining requires a good understanding of the data mining techniques to improve business opportunity and to improve the quality of service provided. In response to such needs, this pa...
Article
Full-text available
Big data " is coined to address massive volumes of data sets usually huge, sparse, incomplete, uncertain, complex or dynamic, which are mainly coming from multiple and autonomous sources. The primary sources for big data are from business applications, public web, social media, and sensor data and so on. " Big data mining " involves knowledge disco...

Network

Cited By