Suguna Ramadass

Suguna Ramadass
Vel Tech - Technical University | VELTECH · Department of Computer Science and Engineering

Ph D

About

46
Publications
18,993
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
380
Citations

Publications

Publications (46)
Article
Full-text available
In the era of social media, a large volume of data is generated by applications such as the industrial internet of things, IoT, Facebook, Twitter, and individual usage. Artificial intelligence and big data tools plays an important role in devising mechanisms for handling this vast volume of data as per the required usage of data to form important i...
Article
To discover a novel and dynamic approach for frequent itemsets generation and also for generating association rules is an imperative aspect in data mining. With the fast increase in databases, new transactions added, the incremental mining is acquainted to resolve the issues of maintaining association rules in updated databases. Earlier algorithms...
Article
Full-text available
According to recent statistics, there was drastic growth in online business sector where more number of customers intends to purchase items. Due to these retailers accumulates huge volumes of data from day to day operations and engrossed in analyzing the data to watch the behavior of customers at items which strengthen the business promotions and c...
Article
Association Rule Mining is an important field in knowledge mining that allows the rules of association needed for decision making. Frequent mining of objects presents a difficulty to huge datasets. As the dataset gets bigger and more time and burden to uncover the rules. In this paper, overhead and time-consuming overhead reduction techniques with...
Article
Full-text available
Identifying sarcasm present in the text could be a challenging work. In sarcasm, a negative word can flip the polarity of a positive sentence. Sentences can be classified as sarcastic or non-sarcastic. It is easier to identify sarcasm using facial expression or tonal weight rather detecting from plain text. Thus, sarcasm detection using natural lan...
Article
Ecommerce has evolved to make product discovery easier in a virtual form and purchase through online retailers. Over the last decade, the development of the digital economy with the online sector has risen sharply. Despite best-laid plans by the digital market and the amount of items placed in the virtual carts, the rate of cart abandonment (CA) is...
Article
Full-text available
Purpose-This paper aims to propose a novel methodology for classifying the gestures using support vector machine (SVM) classification method. Initially, the Red Green Blue color hand gesture image is converted into YC b C r image in preprocessing stage and then palm with finger region is segmented by threshold process. Then, distance transformation...
Article
Association Rule Mining is an important field in knowledge mining that allows the rules of association needed for decision making. Frequent mining of objects presents a difficulty to huge datasets. As the dataset gets bigger and more time and burden to uncover the rules. In this paper, overhead and time-consuming overhead reduction techniques with...
Article
Full-text available
The physical movement of the human hand produces gestures, and hand gesture recognition leads to the advancement in automated vehicle movement system. In this paper, the human hand gestures are detected and recognized using convolutional neural networks (CNN) classification approach. This process flow consists of hand region of interest segmentatio...
Chapter
Dimensionality reduction is the process of identifying insignificant data variables and dropping them. The process culminates in obtaining a set of principal variables. Dimensionality reduction not only removes the redundant features, also reduces storage and computation time. Feature Selection and Feature extraction are the two components in dimen...
Chapter
Full-text available
Recently, Industries are focusing on cultivar prediction of customer classes for the promotion of their product for increasing the profit. The prediction of customer class is a time consuming process and may not be accurate while performing manually. By considering these aspects, this paper proposes the usage of machine learning algorithms for pred...
Chapter
Full-text available
Sarcasm is an unwelcome impact or a linguistic circumstance to express histrionic and bitterly opinions. In sarcasm single word in a sentence can flip the polarity of positive or negative statement totally. Therefore sarcasm occurs when there is an imbalance between text and context. This paper surveys different approaches and datasets for sarcasm...
Article
Scaling is the major operation performed in Transformation of images. The Scaling is an important operation for resizing and reshaping the images that are in digital form. Various operations can be performed with digital images out of which the shrinking and zooming are the most widely operations by any type of users in the world. The other name fo...
Article
Full-text available
ARM is a significant area of knowledge mining which enables association rules which are essential for decision making. Frequent itemset mining has a challenge against large datasets. As going on the dataset size increases the burden and time to discover rules will increase. In this paper the ARM algorithms with tree structures like FP-tree, FIN wit...
Article
Full-text available
Recently, manufacturing industry faces lots of problem in predicting the customer behavior and group for matching their outcome with the profit. The organizations are finding difficult in identifying the customer behavior for the purpose of predicting the product design so as to increase the profit. The prediction of customer group is a challenging...
Article
Full-text available
Recently, engineers are concentrating on designing an effective prediction model for finding the rate of student admission in order to raise the educational growth of the nation. The method to predict the student admission towards the higher education is a challenging task for any educational organization. There is a high visibility of crisis towar...
Article
Full-text available
Regression analysis is used to find the trends in the data. The analysis helps to find the relationship between dependent and independent variables in the dataset. It also suggests the degree of influence of Independent variables towards the prediction of desired outcome. Multiple Linear Regression technique builds a model with more than one predic...
Chapter
Full-text available
The Internet of Things is evolving as a complete matured technology to be used in all the Smart applications and it establishes itself in the future generations of internet. As like Internet of Things, Blockchain is the blooming technology in which each node involved in the blockchain contains the distributed ledger which enhances the security and...
Article
Surrendered protest identification is a fundamental necessity in numerous video surveil-spear settings. This Paper presented a relinquished question identification apparatus in light of an arrangement of conceivable occasions and on an arrangement of guidelines to follow up on those occasions. Items unfamiliar to a standard situation are removed ut...
Article
Search engines move us to access any information across internet. The World Wide Web is a wide source of information. The capacity of information enlarges each year in the internet. Due to this, retrieving the information from the web becomes a complicated problem. So we need to simplify the searching process. With this in concern, we try to make a...
Article
Image pre-processing techniques are used to understand the image content in a better way so that analysis can be done effectively. The main objective is to identify the interest points in the image which further helps in feature extraction. Pre-processing performs operations with images at the lowest level of abstraction where both input and output...
Article
The major challenges of any companies or organizations are to maintain information security. The routine work of an employee in an organization is totally based on the available information in the organization. Some employees may do their work sitting at home. USB storage devices are commonly used to carry the information from one to other system....
Article
Noise in images can be characterized as a random variation of brightness information. It can be a by-product of image capture that conceals the desired information. All digital images are subject to different types of noise. Noise is the result of errors during acquisition process which affects the original pixel values in the image. Noise can be i...
Article
Full-text available
One of the main problems in Internet security is unknown "zero-day" phishing e-mail attack, a new phishing e-mail that has not been trained on the old data sample or blacklisted. Existing phishing e-mail prevention mechanisms do not perform well against zero-day phishing e-mail attacks. This paper introduces a novel framework, called phishing dynam...
Conference Paper
We have considered a component based design approach for developing real-time software for an On-Board Computer (OBC) in an imaging satellite. The On-Board Computer (OBC) is the system which controls and co-ordinates the functions of satellite. It consists of all sub system interfaced with it. The following subsystem in the OBC is Telemetry and Tel...
Article
Full-text available
We present a worm warning system that leverages the reliability of IP-Flow and the effectiveness of machine learning techniques. Our system aims at setting an alarm in case a node is behaving maliciously. Typically, a host infected by a scanning or an email worm initiates a significant amount of traffic that does not rely on DNS to translate names...
Article
Full-text available
Computer virus is a computer program that can copy itself and infect a computer, computer virus have become an increasingly important problem that threatens the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, previously unseen malicious executables. This paper presents a new method for...
Article
Textures are core components of most images and texture analysis plays an important role in computer vision applications. The paper proposes a novel method for extracting texture features from two-dimensional images. The framework is based on a set of operators devised from orthogonal polynomials. Orthogonal polynomial basis for a specific size is...
Chapter
Feature Extraction is the method of capturing the visual content of images for indexing and retrieval. It simplifies the amount of information required to describe a large set of data. In computer vision, feature detection refers to the computation of local image features from the image. Texture is the core element in numerous computer vision appli...
Chapter
Texture is the core element in numerous computer vision applications. The objective of this paper is to present a novel methodology for learning and recognizing textures. A local binary pattern (LBP) operator offers an efficient way of analyzing textures. A multi-level local binary pattern operator which is an extension of LBP is proposed for extra...
Article
Security and authentication of a person is a crucial part of any industry. There are many techniques used for this purpose. One of them is face recognition. Face recognition is an effective means of authenticating a person. The advantage of this approach is that, it enables us to detect changes in the face pattern of an individual to an appreciable...
Article
This paper presents a new methodology for discovering features of texture images. Orthonormal Polynomial based Transform is used to extract the features from the images. Using orthonormal polynomial basis function polynomial operators with different sizes are generated. These operators are applied over the images to capture the texture features. Th...
Conference Paper
Finding resources in mobile ad hoc network which is infrastructure less and all of nodes are free to move from a position to new position, is not easy and has a direct relation to the method of storing services information among the network. In this paper we propose a way for advertising and management of resources information in the network that r...
Article
The objective of this paper is to propose a new algorithm for classifying the concept present in the image. The training images are segmented with fixed size blocks and features are extracted from it. The features are extracted by using the orthogonal polynomials based transformation. From the feature set vectors, a codebook is generated for each c...
Conference Paper
We present an efficient technique for face detection that filters the face-like regions from a gray image and then detects the faces using Support Vector Machines (SVM) from these potential regions. The technique focusses on extracting the probable eye-regions since eyes are the most prominent features of a face. The probable location of eyes is us...
Article
The fundamental problem with any network administration systems today is its ability to cope with the rising amount network problems. There are two methods to address this problem, where by network administrator can apply active or passive monitoring method. iNetmon had choose passive method, so that it is real time. Passive approach does not exclu...

Network

Cited By