SHREIS RESEARCH CENTRE

SHANKARA RESEARCH CENTRE IN INFORMATION SCIENCE the Research centre of CSE Dept was inaugurated by Dr. A.P. J. Abdul Kalam (Ex President of India)on Oct 2009.The centre focuses on the following areas-Information Security ,Data mining and Image processing

More

SHREIS JOURNAL OF SCIENTIFIC RESEARCH- SJSR

SJSR, a quarterly International journal, dedicates to the latest advancements in all branches of Engineering, Science, Technology, Mathematics and Business management.

More

research & publications

Early detection of Alzheimer's Disease using Local measure on Magnetic Resonance Images

Abstract:This Alzheimer's disease (AD) is the most common cause of dementia, which is a non curable after a certain stage. The nerve cells, which are very essential to carry messages in the brain, particularly those respons...

More
Clinical Decision support system for Brain MR images

Abstract: Researchers have been developing computerized methods to help the medical expert in their diagnostic process. Most of these efforts have primarily focused to improve the effectiveness in s...

More
Duplicate Record Detection in XML using AI Techniques

Abstract:Duplicate detection multiple representation of same entity. XML is widely used in almost all applications especially data in web. Dueto the wide usage of XML it is essential to identify duplicates in it. Various meth...

More
A Genetic Optimized approach for Detecting XML Duplication using MBAT

Abstract:Duplicate means representing two real world objects to the same entity. Now XML is used for data transmission in web, presence of duplicates is the major problem that faced on XML mining. Due to the wide use of XML we ...

More
An Extended TDW Scheme by Word Mapping Technique

Abstract:In the recent years there is a large growth in web contents over the internet.The internet does not provide any standard mechanism for verification of web contents before hosting them in ...

More
Web Page Categorization with Extended TDW Scheme

Abstract:The exponential growth of internet over the past decade has increased millions of web pages published on every subject. Internet provides only a medium for communication between the compu...

More
Near-Duplicate Web Page Detection by Enhanced TDW and simHash Technique

Abstract:Internet is one of the imperative explosion in communication and information retrieval. This massive development of web prompts host millions of web pages in heterogeneous platform. Due to the lack of a standard mechan...

More
Near-Duplicate Web Page Detection by Enhanced TDW and simHash Technique

Abstract:Internet is one of the imperative explosio...

More
Load Balancing In Cloud: Workload Migration among Virtual Machines

Abstract:Day by day increase in online computation and migration to cloud has significantly increase the importance of load balancing. Load balancing facilitates uninterrupted availability of the ...

More
Region Incrementing Visual Cryptography Using Lazy Wavelet Transform

Abstract:Video steganography is the most widely used form of steganography. Steganography is an art of hiding the secret information inside digitally covered information. The hidden message can be...

More
Digital Secret Sharing using XOR based region incrementing and lazy wavelet in video

Abstract:Secret sharing is the process of distributing a secret amongst a group of participants each of whom is allocated a share of the secret. This secret can be reconstructed only when a enough n...

More
Data Transformation Method For Discrimination Prevention Along With Privacy Preserving

Abstract:Datamining is mining useful information from huge dataset. We can classify a datamining system based on the type of knowledge mined. that is datamining system is classified based on the f...

More
CBIR of Brain MR Images using Histogram of Oriented Gradients and Local Binary Patterns: A Comparative Study

Abstract:Retrieval of similar images from large dataset of brain images across patients would help the experts in the decision diagnosis process of diseases. Generally, visual features such as col...

More
An Efficient CBIR of Brain MR Images Using Histogram of Oriented Gradients And Local Binary Pattern

Abstract:Retrieval of similar images from large dataset of brain images across p...

More
Cheating Prevention Schemes for Visual Cryptography

Abstract:Visual cryptography is an encryption technique to encrypt a secret image into different shares such that stacking a sufficient number of shares reveals the secret image. Most of the previous research work on VC focus...

More
Security Enhanced Visual Cryptography Scheme with Cheating Prevention Ability

Abstract:Visual Cryptography (VC) is an encryption technique to encrypt a secret image into transparent shares such that stacking an enough number of shares reveals the secret image without any complex computation. In the exist...

More
An Efficient Algorithm for Identification of Most Valuable Itemsets from WebTransaction Log Data

Abstract:Web Utility mining has recently been a bloomingtopic in the field of data mining and so is the web mining, animportant research topic in database technologies. Thus, theweb utility mining is effective in not only dis...

More
A Comparative Study on Gene Selection and Classification Methods for the Cancer Subtypes Prediction

Abstract:Microarray gene expression data gained great importance in recent years due to its role in disease diagnoses and prognoses which help to choose the appropriate treatment plan for patients. Interpreting gene expression ...

More
Prediction of Cancer Subtypes from Microarray Data through Kernelized Fuzzy Rough Set and Association Rule Based Classification

Abstract:Microarrays have now gone from obscurity to being almost ubiquitous in biological research.
At the same time, the statistical methodology for microarray analysis has progressed from simple visual asses...

More
An Efficient Method for Internet Traffic Classification and Identification using Statistical Features

Abstract:Traffic Classification is a method of categorizing the computer network traffic based on various features observed passively in the traffic into a number of traffic classes. Due to the rapid increase of different Int...

More
Web Usage Analysis and Web Bot Detection based on Outlier Detection

Abstract:For securing the ones network it is important to detect botnet. For improve the efficiency and accuracy in data mining use optimization techniques. One of the current application areas is outlier detection that has n...

More
Efficient Pattern-Based Query search in Text Documents

Abstract:Text mining is a technique that helps the user to find useful information from a large amount of digital text document. It is a challenging issue to find accurate knowledge (or features) in text documents to help use...

More
Efficient Pattern-Based Query search in Text Documents

Abstract:Text mining is a technique that helps the user to find useful information from a large amount of digital text document. It is a challenging issue to find accurate knowledge (or features) in text documents to help use...

More
A Review of Image Segmentation and Classification Techniques for Automatic Pap smear Screening

Abstract:Pap smear test has been widely used for detection of cervical cancer. However, the conventional Pap smear test has several shortcomings including: subjective nature (dependent on individual interpretation), low sensiti...

More
Cervical Cancer Detection through Automatic Segmentation and Classification of Pap smear Cells

Abstract:Pap smear test has been widely used for detection of cervical cancer. However, the conventional Pap smear test has several shortcomings including: subjective nature (dependent on individual interpretation), low sensiti...

More
Automated Cervical Cancer Detection through RGVF segmentation and SVM Classification

Abstract:Pap smear test has been broadly used for detection of cervical cancer. However, the conventional Pap smear test has several shortcomings including: subjective nature (dependent on individual interpretation), low sens...

More
DENSITY BASED AND PARTITION BASED CLUSTERING OF UNCERTAIN DATA BASED ON KL-DIVERGENCE SIMILARITY MEASURE

Abstract:Data mining problems are significantly influenced by the uncertainty in data. Clustering certain data has been well studied in many field of data mining, but there is an only preliminary study in clustering uncertain...

More
Satellite Image Registration based on SURF and MI

Abstract:Registration of satellite imagery is key step for remote sensing applications like global change detection, image fusion, and feature classification. Manual registration is very time consuming and repetitive, an auto...

More
Diverse Visual Cryptography Schemes: A Glimpse

Abstract:Visual cryptography scheme is a cryptographic process which allows visual information (e.g. images, printed text, and handwritten notes) to be encrypted in such a way that the decryption can be performed by the human...

More
Random Grid based Extended Visual Cryptography Schemes using OR and XOR Decryption

Abstract:Visual cryptography (VC) is a paradigm of cryptography which prevents a secret from being modified or destructed by using the notions of perfect cipher and can be easily decoded by the human visual system. It doesn&rsq...

More
Random Grid based Visual Cryptography using a common share

Abstract:Visual cryptography (VC) is a paradigm of cryptography which prevents a secret from being modified or destructed by using the notions of perfect cipher and the secret can be reconstructed by the human visual system. ...

More
View All

Ongoing Research