E. Kodhai

@citchennai.edu.in

Professor/CSE
Chennai Institute of Technology



                    

https://researchid.co/kodhaie

Dr. E. Kodhai is currently working as Professor in the Department of Computer Science and Engineering at Chennai Institute of Technology affiliated to Anna University, Chennai, India. She has completed her M.C.A from Cauvery College for women, Trichy affiliated to Bharathidasan University, Trichy and M.E. in Computer Science and Engineering from Vinayaka Mission’s Kirupananda Variyar Engineering College, Salem. She has completed her Ph.D from Pondicherry Engineering College affiliated to Pondicherry University, Puducherry, India. She has more than 23 years of experience in teaching in various engineering colleges. Her Research interests include Software Clones, Software Engineering, and Artificial Intelligence. She has published more than 100 papers in international conference and journals. She is a member of ISTE, India.

EDUCATION

AUG 2015
PH.D (CSE), Pondicherry Engineering College, Puducherry, India.
• Awarded Ph.D
• Thesis title : Development of a Light-Weight Hybrid (LWH) Approach for Method-level Code Clone Detection and Maintenance

JUL 2006
M.TECH (CSE), Vinayaka Mission’s Kirupananda Variyar Engineering College, Salem, India.

APR 1999
MCA, Cauvery College for Women, Trichy, India.

APR 1996
B.SC (MATHS), Seethalakshmi Ramasamy College, Trichy, India.

MAY 1993
12TH STANDARD, Sacred Heart Convent Higher Secondary School, Villupuram, India.

JUN 1991
10TH STANDARD, Sacred Heart Convent Higher Secondary School, Villupuram, India.

RESEARCH, TEACHING, or OTHER INTERESTS

Computer Engineering, Software, Artificial Intelligence, Computer Science

16

Scopus Publications

180

Scholar Citations

7

Scholar h-index

6

Scholar i10-index

Scopus Publications

  • An artificial intelligence based algorithm for prevention of Covid
    Anand Mohan, E. Kodhai, Makarand Upadhyaya, K. Thilagam, Ashim Bora, P. Vijayakumar, and Pravin R. Kshirsagar

    AIP Publishing
    The goal to promote human limits is for Artificial Intelligence (AI). It takes a posture on public administrations, represents the increasing availability of regaining clinical data and the rapid creation of intelligent strategies. The need to stress the need to use AI in the fight against the COVID-19 crisis. The paper outlines the main role played by Ai technologies in this unprecedented war and introduces a survey of AI methods used for multiple purposes in the fight against the outbreak of COVID-19. This paper also explains how the body temperature and coughing of the incoming person are assessed and whether the incoming person has not a protective facial mask. Should either of the above tests disqualify the participant, an alarming device invokes the local officials;the entrant may otherwise enter the premises after his/her hand has been sanitized. © 2022 Author(s).

  • Artificial intelligence based handwritten text recognition system
    B. Parvathi Sangeetha, E. Kodhai, M. Belsam Jeba Ananth, R. Revathi, Akkaraju Sailesh Chandra, and P. Vijayakumar

    AIP Publishing

  • Literature Review on Access Control for Personal Health Records
    E. Kodhai, Manga Haneesha Gowri, Susmitha S., and Muthamizh R.

    IEEE
    Personal Health Records are used in hospitals to maintain data and details of the patients. These records are really important and contain the health history of the patients. In case of any malpractice, the health records of the patients might be mishandled. Here we have surveyed projects and papers that are related to Personal Health Records. These records of the patients were first in hand-written documents later they were converted to electronic records. These electronic records also have less security and they are stored in the local server they are then made a little secured and can be stored in the cloud. This survey explores us about the technologies and techniques that are used in the literature to keep the documents of the patients. These patient documents holds the personal health records in a more secure manner.

  • Literature Review on Emotion Recognition System
    E. Kodhai, A. Pooveswari, P. Sharmila, and N. Ramiya

    IEEE
    Emotion plays a significant role in human beings daily lives. Humans can easily sense a person's emotions. But in some cases devices need to sense people's emotions. Machine learning is a sub-part of artificial intelligence that produces robots handling tasks like us. Emotion recognition is a small module that can be easily achieved by machines using machine learning algorithms. This paper describes the various algorithms used to recognize the facial expressions of a person such as happy, angry, sad, disgust, neutral, fear. Gabor filters and Local Binary Pattern Operators (LBP) are discussed for the process of feature extraction. Different types of classification algorithms such as Support Vector Machines, K-Nearest Neighbors are discussed. The training of the image data is carried by comparing various neural networks including Attentional Neural Network, Convolutional neural network, shallow neural network etc.

  • Detection of breast cancer using digital image processing techniques
    Dipali A. Sable and S. Ganorkar

    Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
    Breast cancer, a major public health contention and currently causes an increased rate of cancer death in women. The preeminent intent of this project in medical diagnostics is by using mammography, that is a unique imaging technique in medicine for examining the breasts. A higher quality mammographic images (for example electronic pictures) are stored, mammography method (i.e exam) is performed, which is a prior stage for detection and diagnosis of bosom’s malignant growth. In order to detect the tumor FCM algorithm for segmentation is used and the features are extracted by using multi-level wavelet transformation technique with PCA and then some features are added with GLCM features. Further, those segmented region features are extracted and the dataset is trained and tested completely. The images are classified by using SVM, KNN, Tree classifier, Neural Networks or Naive Bayes classifier. Finally, the images from Kaggle dataset are compared and categorized as normal, benign or malignant tumors.

  • Textaloud assistant app development for multilanguage


  • Method-level code clone detection for Java through hybrid approach


  • Literature review for detecting selfish node


  • Method-level incremental code clone detection using hybrid approach
    E. Kodhai and S. Kanmani

    Inderscience Publishers

  • An optimized bandwidth allocation scheme in relay node for concentrated WSNs
    E. Kodhai and P. Bharathi

    IEEE
    In a low time to live based wireless network, the node drops all its energy before actually transferring the data given to it. This serves as a drawback where the data is not transferred completely resulting in bandwidth wastage and improper message delivery. To address this problem we formulate new routing techniques by which the data from one part is scheduled to reach the destination based on the computed time to live and available bandwidth. Other than forming a routing tree which may fail when overhearing occurs, split the data and place them into appropriate bandwidths where the bandwidth wastage is minimal. Therefore the process is divided into two steps: Identifying the throughput and the mean bandwidth, initiate the data such that a least amount of bandwidth is wasted. In this method, the routing must be updated every six sees, with respect to the time to live (computed) of the node. The node energy is the tedious process which can be further enhanced by controlling the node between active and sleep state. The problems of link failure, denial of service can be rectified in this process.

  • Detecting and investigating the source code changes using logical rules
    E. Kodhai and B. Dhivya

    IEEE
    Software developers often need to examine program differences between two versions and reason about the changes. Analyzing the changes is the task. To facilitate the programmers to represent the high level source code changes, this proposed system introduces the rule-based program differencing approach to represent the changes as logical rules. This approach is instantiated with three levels: first level describes the changes in method header names and signature; second level captures change in the code level and structural dependences; and third level identifies the same set of function with different name. This approach concisely represents the systematic changes and helps the software engineers to recognize the program differences. This approach can be applied in open source project to examine the difference among program version.

  • Method-level code clone modification environment using CloneManager
    E. Kodhai and S. Kanmani

    Springer International Publishing

  • A comparative analysis of software clone management techniques


  • Extracting the similarity in detected software clones using metrics
    A Perumal, S Kanmani, and E Kodhai

    IEEE
    Copying a code fragment and reusing it by pasting with or without minor modifications is a common practice in software development environments. Various techniques have been proposed to find duplicated redundant code. Previous work was simple and practical methods for detecting exact and near miss clones over arbitrary program fragments in program source code by using abstract syntax trees. Our proposal is a new technique for finding similar code blocks and for quantifying their similarity. Our techniques can be used to find clone clusters, sets of code blocks all within a user-supplied similarity. It detects similar clones using metrics for type 1, type 2 of clones.

  • Detection of type-1 and type-2 code clones using textual analysis and metrics
    E. Kodhai, S. Kanmani, A. Kamatchi, R. Radhika, and B. Vijaya Saranya

    IEEE
    Clone Detection has considerably evolved over the last decade, leading to approaches with better results but with increasing complexity. Most of the existing approaches are limited to finding program fragments similar in their syntax or semantics, while the fraction of candidates that are actually clones and fraction of actual clones identified as candidates on the average remain similar. In this paper, a metric-based approach combined with the textual comparison of the source code for the detection of functional Clones in C source code has been proposed. Various metrics had been formulated and their values were utilized during the detection process. Compared to the other approaches, this method is considered to be the least complex and is to provide a more accurate and efficient way of Clone Detection. The results obtained had been compared with the two other existing tools for the open source project Weltab.

  • CloneManager: A tool for detection of type1 and type2 code clones
    E. Kodhai, S. Kanmani, A. Kamatchi, R. Radhika, and B. Vijaya Saranya

    Springer Berlin Heidelberg

RECENT SCHOLAR PUBLICATIONS

  • Smart attendance system for COVID-19
    E Kodhai
    Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12 (10 2021

  • WITHDRAWN: IoT based garbage bin monitoring and decluttering system
    M Rekha, E Kodhai, S Kuzhaloli, P Sharma, A Kumar, N Kumar
    Materials Today: Proceedings 2021

  • An Efficient Malicious node detection algorithm for Vehicular Ad-hoc network
    PV L.M.Varalakshmi, E.Kodhai, G.Radhakrishnan, K.Thilagam, L.Kurinjimalar
    International Journal of Advanced research in engineering and technology 12 2020

  • Literature review on emotion recognition system
    E Kodhai, A Pooveswari, P Sharmila, N Ramiya
    2020 International Conference on System, Computation, Automation and 2020

  • Literature Review on Access Control for Personal Health Records
    E Kodhai, MH Gowri, S Susmitha, R Muthamizh
    2020 International Conference on System, Computation, Automation and 2020

  • An Efficient Personal Health Record Storage using Block Chain Technology
    MR Dr. E. Kodhai, Manga Haneesha Gowri, Susmitha. S
    International Journal of Engineering Science and Computing 10 (5), 26065 - 26068 2020

  • sentiment analysis for customer service
    G E.Kodhai,B.nivetha,K.sriakila
    international journal of engineering and advanced technology (IJEAT) 9 (4 2020

  • Emotion Recognition System for Visually Impaired
    RN 2. Kodhai.E, Pooveswari.A, Sharmila.P
    International Journal of Engineering and Advanced Technology (IJEAT) 9 (4 2020

  • A survey on malware detection on Android IoT devices
    MK GAYATHRI, E Kodhai
    JAC: A Journal of Composition Theory 13 (3), 45-55 2020

  • Secured Data Sharing by Two Factor Data Protection Mechanism for Cloud Storage
    VVSK Ramalingam. A, Kodhai. E, Gayathri. K, Vivekanandan. K
    Mukt Shabd Journal 9 (7), 1198 – 1208 2020

  • Analysing Sentiment and Aspects from Reviews for Ensuring Product Quality
    GR Dr. E. Kodhai, R. Yamuna Devi, R. Dharani
    International Journal of Engineering Research & Technology (IJERT) 8 (3 2019

  • Textaloud Assistant App Development for Multilanguage
    DA E.Kodhai, S.Abinayalakshmi, D.Pretha
    International Journal of Innovative Technology and Exploring Engineering 2019

  • Detection of Breast Cancer using Digital Image Processing Technique
    VV E.Kodhai, S.Jaseema Yasmin, K.Subhasree
    International Journal of Recent Technology and Engineering (IJRTE) 8 (2S2), 5-9 2019

  • A Novel Clustering Algorithm for Big Data: K-Means -Fuzzy C Means
    JA A.Manikandan, Danapaquiame.N, R.Gayathri , E. Kodhai
    Bioscience Biotechnology Research Communications 1, 85-93 2018

  • Frequent Itemset Using Abundant Data on Hadoop Clusters in Big Data
    GS Balaji.V, Danapaquiame.N, R.Gayathri,E. Kodhai
    International Journal of Engineering and Science 1, 104-112 2018

  • A Survey on Secure Sharing and Auditing Process using Privacy Preserving Tool in Cloud Data Storage
    DVR Hariprakash, J.Pradeep, E.Kodhai, Dr. Md. Ali Hussain
    International Journal of Pure and Applied Mathematics 117 (1), 383-387 2017

  • SMART DISEASE PREDICTION USING CLUSTERING
    KE Vagulamaliga.K, Mirudhula. S, Pavithra S.R, Rama.K
    Asian Journal of Multidisciplinary Research (AJMR) 3 (2), 27-29 2017

  • LITERATURE REVIEW FOR DETECTING SELFISH NODE
    N Kodhai.E, Jayavani.R, Kirutthiga.P
    Journal of Advanced Research in Dynamical and Control Systems 9 (6), 552-566 2017

  • SMART SEARCHING TECHNIQUE WITH THE COMBINATION OF SEMANTIC, SYNTACTIC AND RANKING ALGORITHM
    E Kodhai, B Deepika, M Dhivya, CA Valli
    2017

  • SMART DISEASE PREDICTION USING EFFECTIVE VECTOR MACHINE ALGORITHM
    E Kodhai, K Vagulamaliga, S Mirudhula, SR Pavithra, K Rama
    2017

MOST CITED SCHOLAR PUBLICATIONS

  • Detection of type-1 and type-2 code clones using textual analysis and metrics
    E Kodhai, S Kanmani, A Kamatchi, R Radhika, BV Saranya
    2010 International Conference on Recent Trends in Information 2010
    Citations: 46

  • Method-level code clone detection through LWH (Light Weight Hybrid) approach
    E Kodhai, S Kanmani
    Journal of Software Engineering Research and Development 2, 1-29 2014
    Citations: 40

  • Literature review on emotion recognition system
    E Kodhai, A Pooveswari, P Sharmila, N Ramiya
    2020 International Conference on System, Computation, Automation and 2020
    Citations: 14

  • Extracting the similarity in detected software clones using metrics
    A Perumal, S Kanmani, E Kodhai
    2010 International Conference on Computer and Communication Technology 2010
    Citations: 13

  • Method level detection and removal of code clones in C and Java programs using refactoring
    E Kodhai, V Vijayakumar, G Balabaskaran, T Stalin, B Kanagaraj
    Int. J. Comput. Commun. Inf. Syst.(IJCCIS) 2 (1), 93-95 2010
    Citations: 12

  • Clone detection using textual and metric analysis to figure out all types of clones
    E Kodhai, A Perumal, S Kanmani
    International Journal of Computer Communication and Information System 2 (1 2010
    Citations: 10

  • Method-Level code clone modification using refactoring techniques for clone maintenance
    E Kodhai, S Kanmani
    Advanced Computing 4 (2), 7 2013
    Citations: 9

  • CloneManager: a tool for detection of type1 and type2 code clones
    E Kodhai, S Kanmani, A Kamatchi, R Radhika, BV Saranya
    Information Processing and Management: International Conference on Recent 2010
    Citations: 6

  • Detecting and investigating the source code changes using logical rules
    E Kodhai, B Dhivya
    2014 International Conference on Circuits, Power and Computing Technologies 2014
    Citations: 4

  • Code Clones Detection in Websites using Hybrid Approach
    R Sivakumar, K Kodhai
    International Journal of Computer Applications 48 (13), 23-27 2012
    Citations: in Websites using Hybrid Approach

  • Code Clones Detection in Websites using Hybrid Approach
    R Sivakumar, K Kodhai
    International Journal of Computer Applications 48 (13), 23-27 2012
    Citations: 4

  • WITHDRAWN: IoT based garbage bin monitoring and decluttering system
    M Rekha, E Kodhai, S Kuzhaloli, P Sharma, A Kumar, N Kumar
    Materials Today: Proceedings 2021
    Citations: 3

  • A Novel Clustering Algorithm for Big Data: K-Means -Fuzzy C Means
    JA A.Manikandan, Danapaquiame.N, R.Gayathri , E. Kodhai
    Bioscience Biotechnology Research Communications 1, 85-93 2018
    Citations: 3

  • Method-level incremental code clone detection using hybrid approach
    E Kodhai, S Kanmani
    International Journal of Computer Applications in Technology 54 (4), 279-289 2016
    Citations: 3

  • Method-level code clone modification environment using CloneManager
    E Kodhai, S Kanmani
    Modern Trends and Techniques in Computer Science: 3rd Computer Science On 2014
    Citations: 2

  • Code clones detection in websites using hybrid approach
    S Rubala, E Kodhai
    IJCA (0975–888) 48 (13) 2012
    Citations: 2

  • Kodhai. E,“
    R Sivakumar
    Code Clones Detection in Websites using Hybrid Approach”, in, 0975-888 2012
    Citations: 2

  • Department of IT, SMVEC, Puducherry, India; Kanmani S., Kamatchi A., Radhika R., Vijaya Saranya B
    E Kodhai
    Department of IT, PEC, Puducherry, India, 241-243 2010
    Citations: 2

  • Smart attendance system for COVID-19
    E Kodhai
    Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12 (10 2021
    Citations: 1

  • A survey on malware detection on Android IoT devices
    MK GAYATHRI, E Kodhai
    JAC: A Journal of Composition Theory 13 (3), 45-55 2020
    Citations: 1