Suja Radha

Suja Radha
VIT University | VIT · School of Information Technology & Engineering (SITE)

M.F.M., M.E., Ph.D.,

About

89
Publications
81,143
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
877
Citations
Introduction
To pursue a challenging career with a result-oriented progressive organization that offers ample opportunities to apply my knowledge and skills along with my hard work and patience and to be involved as a part of the team that dynamically works towards the growth of the organization. Comprehensive problem-solving abilities, team facilitator, ability to deal with people diplomatically, willingness to learn. Has 15 years of teaching experience and has been serving as an associate professor in School of Information Technology and Engineering in Vellore Institute of Technology, Vellore. Organized and attended a number of workshops. Her area of research interest includes data mining, including data mining applications in human health care, machine learning, software engineering, and image proc

Publications

Publications (89)
Article
Full-text available
Any nation’s growth depends on the trend of the price of fuel. The fuel price drifts have both direct and indirect impacts on a nation’s economy. Nation’s growth will be hampered due to the higher level of inflation prevailing in the oil industry. This paper proposed a method of analyzing Gasoline and Diesel Price Drifts based on Self-organizing Ma...
Article
Full-text available
Dementia is a condition in which cognitive ability deteriorates beyond what can be anticipated with natural ageing. Characteristically it is recurring and deteriorates gradually with time affecting a person’s ability to remember, think logically, to move about, to learn, and to speak just to name a few. A decline in a person’s ability to control em...
Article
Full-text available
Lung cancer is among the most hazardous types of cancer in humans. The correct diagnosis of pathogenic lung disease is critical for medication. Traditionally, determining the pathological form of lung cancer involves an expensive and time-consuming process investigation. Lung cancer is a leading cause of mortality worldwide, with lung tissue nodule...
Chapter
Image captioning is one of the fundamental problems of computer vision technology. Our objective in this work is to use existing image captioning architectures and extend it to develop an architecture to recognize activity happening in an image. We will be focusing on classifying the output of the image captioning model to either positive activity...
Chapter
The word smart homes as it sounds implies to the integrated home system with different sensors along with the usage of modern-day computational data analysis technology to ease out human life thus making it convenient, convectional, and commercial to general public usage. Smart home technology is paving the way inside all phases of people’s life. D...
Chapter
Full-text available
ECG analysis comprises the following steps: preprocessing, segmentation, feature extraction, and classification of heart-beat instances to detect cardiac arrhythmias. This work focuses on the first three steps in cardiac arrhythmia analysis. Since no publicly available feature sets are available for the ECG arrhythmia detection problem, researchers...
Article
Heart failure (HF) is an intercontinental pandemic influencing in any event 26 million individuals globally and is expanding in commonness. HF healthiness consumptions are extensive and will increment significantly with a maturing populace. As per the World Health Organization (WHO), Cardiovascular diseases (CVDs) are the major reason for all-inclu...
Chapter
Internet of Things (IoT) reshapes the incumbent industries into smart industries by bringing more opportunities with efficient decision making. The fundamental characteristics of IoT make the system to face various challenges such as poor interoperability, decentralization, heterogeneous data, diversified devices, network complexity, and security r...
Article
Full-text available
The sudden outbreak of the novel coronavirus (nCoV-19, COVID-19) and its rampant spread led to a significant number of people being infected worldwide and disrupted several businesses. With most of the countries imposing serious lockdowns due to the increasing number of fatalities, the social lives of millions of people were affected. Although the...
Chapter
Coronavirus disease 2019 (COVID-19) is a respiratory ailment that can spread from individual to individual, first recognized during an outbreak in Wuhan, China. Possibility of getting COVID-19 is greater for people who are in contact of someone known to have COVID-19, for example clinical professional, or family member. Peoples at higher peril for...
Article
Full-text available
In the clustering method, the cluster head node loses much energy between transmissions to the base station, confirming that determining the cluster heads is crucial. A robust determination protocol needs to pick cluster heads depending on the node's region and its residual energy. We proposed an innovative approach to the method of selecting clust...
Chapter
Electronic health is the jargon moving around the healthcare sector. Patient record maintenance in digital format popularly called as electonic health record (EHR). EHR holds information about patients’ demographics, track of visits, and treatments. Information about the patients could be retrieved very shortly and accurately due to digitalization....
Article
In recent times Autism Spectrum Disorder (ASD) is picking up its force quicker than at any other time. Distinguishing autism characteristics through screening tests is over the top expensive and tedious. Screening of the same is a challenging task, and classification must be conducted with great care. Machine Learning (ML) can perform great in the...
Article
Full-text available
Bitcoin is a decentralized digital currency without a central bank or single administrator sent from user to user on the peer-to-peer bitcoin blockchain network without intermediaries’ need. In this Bitcoin trend analysis work, initial attributes are considered from five sectors based on financial, social, token, network, and that count to thirteen...
Conference Paper
The first cases of a typical pneumonia of unidentified ailment were reported on December 30, 2019, from Wuhan, China. After many researches, severe acute respiratory syndrome corona virus 2 (SARS-CoV-2) is found as the main reason of the ailment and the problem has been named as COVID-19. The rapid spread of this virus resulted in the worldwide pan...
Conference Paper
Bipolar disorder is a mental ailment caused by maximal mood swings with emotional highs and lows. Nowadays, this has become the most common abnormality related to mental health and furthermore it is ignored by people of all age groups. Bipolar disease is generally heritable but not all siblings of the family will be having it though, and will be ha...
Article
Plants are recognized as essential as they are the primary source of humanity's energy production since they are having nutritious, medicinal, etc. values. At any time between crop farming, plant diseases can affect the leaf, resulting in enormous crop production damages and economic market value. Therefore, in the farming industry, identification...
Article
Nowadays, it is becoming challenging in populated cities like Bangalore, India, to control the Traffic or divert the Traffic. The Traffic authority cannot control Traffic all at a time and cannot collect fines or penalties from people since everything is moving digital. There are many problems like traffic congestions, surveillance. So, we want to...
Chapter
The process of machine learning is known as the “training” of machines and the output generated is known as the “model”. Machine learning is a data analytics tool which automates the building of analytical models. It is a system that gains knowledge from data, with minimal human intervention. Data is provided to the algorithm and it in turn creates...
Article
Full-text available
The E-brainstorming system involves piggy bagging of ideas which results in more idea generation by the agents.Triggering of an idea for one participants happens from another participants, which will help the participants with the new idea. But with ordinary search and retrieval methods only few ideas are generated when compared with E-brainstormin...
Article
Full-text available
Forests play a vital role in the regulation of climate, absorption of carbon dioxide, hydrological cycle, conservation of water, soil and biodiversity and help mitigate natural disasters. With the help of various remote sensors, high-resolution satellite images are being collected nowadays, which helps in tackling the global challenges of forest ma...
Chapter
Across the globe, every city dreams to become a smart city. Integration of information and communication technologies to optimize the lifestyle of people is the process involved in smart city. Each government thinks and takes various measures to fulfil the necessities of smart city. To achieve this vision statement of smartness in various fields, n...
Article
Full-text available
Coronavirus disease (COVID-19) is an inflammation disease from a new virus. The disease causes respiratory ailment (like influenza) with manifestations, for example, cold, cough and fever, and in progressively serious cases, the problem in breathing. COVID-2019 has been perceived as a worldwide pandemic and a few examinations are being led utilizin...
Article
Full-text available
Integration of artificial intelligence (AI) techniques in wireless infrastructure, real-time collection and processing of end-user devices is now in high demand. It is now superlative to use AI to detect and predict pandemic of colossal nature. Coronavirus disease 2019 (COVID-19) pandemic which originated in Wuhan China has had disastrous effects o...
Chapter
Since the last decade, the social media platform has served as an entry point for establishing connections, content sharing and social interactions for many users. Exploiting customer's information is very prevalent nowadays by gaining insight into user's habits, preferences, connections, behaviors, content and location. Logging into a social media...
Data
The images are captured with the help of high-resolution cameras FLIR E8 (Thermal camera). Leaf Description 1 Bacteria leaf blight 220 2 Blast 67 3 Leaf spot 80 4 Leaf folder 34 5 Hispa 142 6 Healthy leaves 93 Total 636
Preprint
Here, we propose a basic model that could be helpful to foresee the spread of COVID-2019. We performed linear regression, Multilayer perceptron and Vector autoregression model for expectation on the COVID-19 kaggle information to anticipate the epidemiological pattern of the disease and rate of COVID-2019 cases in India. Predicted the possible tren...
Preprint
Here, we propose a basic model that could be helpful to foresee the spread of COVID-2019. We performed linear regression, Multilayer perceptron and Vector autoregression model for expectation on the COVID-19 kaggle information to anticipate the epidemiological pattern of the disease and rate of COVID-2019 cases in India. Predicted the possible tren...
Chapter
Public aid knowledge management needs actions, definitions, and laws so as to produce enhancements over public health treatment and designing. These enhancements have often supported a collection of data and indicators, and the health administrators must own admittance to machines that offer elasticity to manage the efficient analysis. Several tech...
Chapter
The growth of IoT is tremendous and is making its presence into nearly every space from industries to health care. The healthcare industry is now getting embraced by technological innovations. IoT is making the promise of smart and connected care a reality. Leading technologies such as Big Data, IoT, advanced analytics, and many other technological...
Chapter
ENotes is a note-taking tool specifically targeted towards online learners. Note-taking in general help students to have a better understanding of what they learn. It also helps the students to improve their writing skills. There are many sophisticated and simple note-taking tools available on the market. Sophisticated tools like Evernotes and OneN...
Article
Breast cancer is a tumor caused by the excessive growth of cells in the breast tissue or near the region of the breast. Breast cancer is most commonly found among women, and it starts developing when the cell tissues from lump of the breast become abnormal or when there is a calcium deposit in the breast. These affected cells form a large lump that...
Article
Full-text available
Machine learning is the intriguing area of research that spreads across all domains helping in providing quality decisions. Demographic have more influence in social happenings along with various personal and social factors. Suicide analysis is one such issue to be handled with great concern that will provide precautionary based on situations. Suic...
Conference Paper
ENotes is a note-taking tool specifically targeted towards online learners. Note-taking in general help students to have a better understanding of what they learn. It also helps the students to improve their writing skills. There are many sophisticated and simple note-taking tools available on the market. Sophisticated tools like Evernotes and OneN...
Article
Full-text available
Machine learning is the worldwide recent research technique for various systems as they are intelligent enough to find the solution for classification and prediction problems. The proposed work is about a hybrid genetic fuzzy algorithm that performs an optimal search as well as classification upon uncertain data. The data which is uncertain is suit...
Article
For centuries, cancer has been a threat to human lives. It has become one of the leading causes of death since many decades. The early detection of cancer can contribute much to reduce the morbidity rate of the disease. The goal of mammography is the early detection of breast cancer, usually through the detection of featured masses and/or micro cal...
Article
Full-text available
A long time ago our society accepted the notion of treating people with disabilities not as unviable and disabled but as differently-abled, recognizing their skills beyond their disabilities. The next step has to be taken by our scientific community, that is, to normalize lives of the people with disabilities and make it so as if they are no differ...
Article
Full-text available
In this work, a framework that helps in the disease diagnosis process with big-data management and machine learning using rule based, instance based, statistical, neural network and support vector method is given. Concerning this, big-data that contains the details of various diseases are collected, preprocessed and managed for classification. Diag...
Article
Full-text available
Article
Full-text available
Healthcare record of patients Information Re-duplication will be a procedure for evacuating copy duplicates of patient’s information and extensively utilized within cloud capacity to decline storage room and transfer speed. On the other hand, there is special case duplicate to each record of patients information is stored only once in cloud regardl...
Article
Full-text available
In the process of respiration in the human body, inhales the oxygen and that is used for breaking down the sugars and carbohydrates into glucose. This in turn gets converted in to energy and blend in to the body. For the conver-sion the hormone named insulin in the blood stream plays the vital role. The pancreas is responsible for the secretion of...
Article
Full-text available
Bug tracking tools help stake holders involved in software projects to detect bugs, resolve them and then ensure to have contingency and preventive measures so that detected bugs are not repeated in the future projects. The present generation of software developed, are enormous and extensive in size inorder to meet customer requirements and hence p...
Article
Full-text available
In the daily life, crime keeps increasing and threatens the lives of the people in public. The accuracy and time of tracing are robust while data mining technique is indulged. The hurdle in the process starts from selecting the related variable for analysis and their sensitiveness. The research work carried on the crime is potential area that requi...
Article
Full-text available
The Frequent Itemsets Mining (FIM) is a demanding task common to several important data mining applications that look for interesting patterns within the databases. Several techniques have been proposed to mine the frequent closed itemsets. In this paper, we have proposed a frequent closed itemset mining technique based on probability. The socio ec...
Book
Full-text available
Article
Full-text available
Data mining finds its application in many areas by its capability of extracting the interesting knowledge from the data set. In the health care department to predict the dreadful disease the output of data mining is highly useful. Particularly in the healthcare, the amounts and complexity of data involved are large. The decision making is highly im...
Article
Full-text available
In current scenario, it becomes difficult to manage the demand of all RaaS (Resource as a service) by a clientin a single cloud. This problem could be overcome by a federated cloud. The great challenge of federated cloud computing are satisfying the client needs, data privacy and security. With the help of cloud, the clients can store and access th...
Article
Full-text available
In our innovative crime location forecast method, at the outset, the crime features are mined from the crime database and used for performing the adaptive mutation-based artificial bee colony (AMABC) algorithm, in which the database attributes and crime values are bunched together. Subsequently, the frequent closed itemsets lattice (FCIL) is built...
Article
Full-text available
Detection of flame based on computational vision has visible attention in the past years. Many selective features such as shape, colour, texture, etc., have been used to detect flames. The drawback to detect flames with these features are that they uses Lucas-Kanade method which is an optical flow method and it adopt flow constancy same for the adj...
Article
Full-text available
Since the birth of civilization, offenses of various sorts have been on an uptrend and no wonder Crime investigation, which is emerging as the supreme law enforcement procedure, particularly of the Government, to check such menaces to the society at large, finds itself engrossed in methodical scrutinizes for spotting and evaluating the designs and...
Article
Full-text available
Analyzing the crime data based on the various socioeconomic key factors using the proposed model with the data from various departments helps for crime detection and prevention. Mining of the target data provides timely and significant information with reference to crime patterns/series. [9] Combining historical data with current data unearth new c...
Article
Full-text available
For any information to be organized, taxonomy is essential. Taxonomy plays a very important role for information and content management. Also it helps in searching of content. The most common method for constructing taxonomy was the manual construction. As the information available today is huge, constructing taxonomy for such information manually...
Conference Paper
This paper is concerned with the comparison of various techniques of annotating/browsing resources in a folksonomy. In traditional knowledge management systems, classification activity is performed by human experts. But, as the size and variety of available information increase, the cost and time required carrying out classification in this way inc...
Conference Paper
For any information to be organized and to quickly search the information, taxonomy is very much essential. Taxonomy is a hierarchical structure of concepts and is a systematic way of classifying knowledge. The most common way of constructing taxonomy for a particular domain is the manual construction which has been developed by domain experts. How...