S. Ramakrishnan

ORCID: 0000-0001-5506-1570
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Magnetic confinement fusion research
  • Particle accelerators and beam dynamics
  • Superconducting Materials and Applications
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Face and Expression Recognition
  • Gene expression and cancer classification
  • Power Systems and Technologies
  • Image Retrieval and Classification Techniques
  • Fusion materials and technologies
  • Distributed and Parallel Computing Systems
  • Blind Source Separation Techniques
  • EEG and Brain-Computer Interfaces
  • Network Security and Intrusion Detection
  • Cloud Computing and Resource Management
  • Image and Signal Denoising Methods
  • Neural Networks and Applications
  • Digital Media Forensic Detection
  • Blood properties and coagulation
  • Spectroscopy and Chemometric Analyses
  • Algorithms and Data Compression
  • Advanced Malware Detection Techniques
  • HVDC Systems and Fault Protection
  • Speech and Audio Processing
  • Erythrocyte Function and Pathophysiology

University of Sharjah
2024

Indian Grassland and Fodder Research Institute
2021-2024

Baylor College of Medicine
2023

Indian Council of Agricultural Research
2022

American Chemical Society
2021

Bowling Green State University
1988-2020

Indian Institute of Technology Madras
2001-2020

Indian Space Research Organisation
2017-2020

University of California, Berkeley
2020

Indian Institute of Technology Delhi
2018-2019

<ns3:p>The khmer package is a freely available software library for working efficiently with fixed length DNA words, or k-mers. provides implementations of probabilistic k-mer counting data structure, compressible De Bruijn graph representation, partitioning, and digital normalization. implemented in C++ Python, under the BSD license at <ns3:ext-link xmlns:ns4="http://www.w3.org/1999/xlink" ext-link-type="uri"...

10.12688/f1000research.6924.1 preprint EN cc-by F1000Research 2015-09-25

The National Spherical Torus Experiment (NSTX) is being built at Princeton Plasma Physics Laboratory to test the fusion physics principles for spherical torus concept MA level. NSTX nominal plasma parameters are R0 = 85 cm, a 67 R/a ⩾ 1.26, Bt 3 kG, Ip 1 MA, q95 14, elongation κ ⩽ 2.2, triangularity δ 0.5 and pulse length of up 5 s. heating/current drive tools high harmonic fast wave (6 MW, s), neutral beam injection (5 80 keV, s) coaxial helicity injection. Theoretical calculations predict...

10.1088/0029-5515/40/3y/316 article EN Nuclear Fusion 2000-03-01

This paper throws light on chaotic shift keying-based speech encryption and decryption method. In this method, the input signals are sampled its values segmented into four levels, namely L 0, 1, 2, 3. Each level of is permuted using generators such as logistic map, tent quadratic Bernoulli’s map. A keying mechanism assigns map for 3 shuffling samples at every level. Further, Chen which uncovers behavior. Various testing methods applied to analyze efficiency system. The results prove that...

10.1186/s13636-017-0118-0 article EN cc-by EURASIP Journal on Audio Speech and Music Processing 2017-09-07

We present a single-chip array of 100 biologically-based electronic neuron models interconnected to each other and the outside environment through 30,000 synapses. The chip was fabricated in standard 350 nm CMOS IC process. Our approach used dense circuit synaptic behavior, including biological computation learning, as well transistor channel models. use Address-Event Representation (AER) spike communication for inputs outputs this IC. architecture infrastructure, chip, configuration tools,...

10.1109/tbcas.2012.2197858 article EN IEEE Transactions on Biomedical Circuits and Systems 2012-06-16

This paper introduces a new model for image texture classification based on wavelet transformation and singular value decomposition. The probability density function of the values coefficients textures is modeled as an exponential function. parameter estimated using maximum likelihood estimation technique. Truncation lower employed to classify in presence noise. Kullback-Leibler distance (KLD) between parameters used similarity metric perform minimum classifier. permits us have closed-form...

10.1109/tip.2007.908082 article EN IEEE Transactions on Image Processing 2007-10-15

The focus of this research paper is to compare the different filter, wrapper and fuzzy rough set based feature selection methods on three parameters namely execution time, number features selected in reduced subset classifier accuracy. results are analyzed using cancer microarray gene expression datasets. This work finds KNN produce higher accuracy compared traditional classifiers available literature. Also approach computationally faster produces lesser genes correlation filter.

10.1016/j.procs.2017.09.127 article EN Procedia Computer Science 2017-01-01

Intrusion Detection Systems are challenging task for finding the user as normal or attack in any organizational information systems IT Industry. The System is an effective method to deal with kinds of problem networks. Different classifiers used detect different attacks In this paper, performance intrusion detection compared various neural network classifiers. proposed research four types Feed Forward Neural Network (FFNN), Generalized Regression (GRNN), Probabilistic (PNN) and Radial Basis...

10.21917/ijsc.2014.0106 article EN cc-by-nc-sa ICTACT Journal on Soft Computing 2014-04-01

The COVID-19 pandemic has motivated researchers all over the world in trying to find effective drugs and therapeutics for treating this disease. To save time, much effort focused on repurposing known other diseases than COVID-19. support these drug efforts, we built CAS Biomedical Knowledge Graph identified 1350 small molecules as potentially repurposable that target host proteins disease processes involved A computer algorithm-driven drug-ranking method was developed prioritize those...

10.1021/acs.jcim.1c00642 article EN cc-by Journal of Chemical Information and Modeling 2021-07-23

Recently, a great deal of physical equipment has been linked to the Internet Things (IoT) by use Radio Frequency Identification (RFID) technology. Moreover, security is primary concern for RFID-enabled IoT devices. In order prevent risks, mutual authentication vital step. The majority protocols are resource-intensive and computationally expensive implement. Hence, low power lightweight hardware implementable protocol well suited RFID enabled resource contrained This paper designed novel...

10.1109/jrfid.2024.3359705 article EN IEEE Journal of Radio Frequency Identification 2024-01-01

The major objective of the National Spherical Torus Experiment (NSTX) is to understand basic toroidal confinement physics at low aspect ratio and high βT in order advance spherical torus (ST) concept. In do this, NSTX utilizes up 7.5 MW neutral beam injection, 6 harmonic fast waves (HHFWs), it operates with plasma currents 1.5 MA elongations 2.6 a field 0.45 T. New facility, diagnostic modelling capabilities developed over past two years have enabled research team make significant progress...

10.1088/0029-5515/45/10/s14 article EN Nuclear Fusion 2005-10-01

Microarray gene expression data plays a prominent role in feature selection that helps diagnosis and treatment of wide variety diseases. contains redundant genes high dimensionality smaller training testing samples. This paper proposes customized similarity measure using fuzzy rough quick reduct algorithm for attribute selection. Information Gain based entropy is used to reduce the first stage proposed method defines selecting minimum number informative removing employed at second stage. The...

10.1016/j.fcij.2018.02.002 article EN cc-by-nc-nd Future Computing and Informatics Journal 2018-02-20

In recent years, the security has become a critical part of any organizational information systems. The intrusion detection system is an effective approach to deal with problems networks using various neural network classifiers. this paper, performance classifiers compared. proposed research three types used are Feed Forward Neural Network (FFNN), Probabilistic (PNN) and Radial Basis (RBNN). problem, feature reduction techniques given KDD Cup 1999 dataset. full featured dataset compared that...

10.1109/icrtit.2011.5972289 article EN 2011-06-01
Coming Soon ...