Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Satish R. Kolhe is active.

Publication


Featured researches published by Satish R. Kolhe.


systems man and cybernetics | 2011

Offline Recognition of Devanagari Script: A Survey

R. Jayadevan; Satish R. Kolhe; Pradeep M. Patil; Umapada Pal

In India, more than 300 million people use Devanagari script for documentation. There has been a significant improvement in the research related to the recognition of printed as well as handwritten Devanagari text in the past few years. State of the art from 1970s of machine printed and handwritten Devanagari optical character recognition (OCR) is discussed in this paper. All feature-extraction techniques as well as training, classification and matching techniques useful for the recognition are discussed in various sections of the paper. An attempt is made to address the most important results reported so far and it is also tried to highlight the beneficial directions of the research till date. Moreover, the paper also contains a comprehensive bibliography of many selected papers appeared in reputed journals and conference proceedings as an aid for the researchers working in the field of Devanagari OCR.


Journal of Pattern Recognition Research | 2009

Dynamic Time Warping Based Static Hand Printed Signature Verification

R. Jayadevan; Satish R. Kolhe; Pradeep M. Patil

Static signature verication has a signicant use in establishing the authenticity of bank checks, insurance and legal documents based on the signatures they carry. As an individual signs only a few times on the forms for opening an account with any bank or for insurance related purposes, the number of genuine signature templates available in banking and insurance applications is limited, a new approach of static handwritten signature verication based on Dynamic Time Warping (DTW) by using only ve genuine signatures for training is proposed in this paper. Initially the genuine and test signatures belonging to an individual are normalized after calculating the aspect ratios of the genuine signatures. The horizontal and vertical projection features of a signature are extracted using discrete Radon transform and the two vectors are combined to form a combined projection feature vector. The feature vectors of two signatures are matched using DTW algorithm. The closed area formed by the matching path around the diagonal of the DTW-grid is computed and is multiplied with the dierence cost between the feature vectors. A threshold is calculated for each genuine sample during the training. The test signature is compared with each genuine sample and a matching score is calculated. A decision to accept or reject is made on the average of such scores. The entire experimentations were performed on a global signature database (GPDS-Signature Database) of 2106 signatures with 936 genuine signatures and 1170 skilled forgeries. To evaluate the performance, experiments were carried out with 4 to 5 genuine samples for training and with dierent ‘scores’. The proposed as well as the existing DTW-method were implemented and compared. It is observed that the proposed method is superior in terms of Equal Error Rate (EER) and Total Error Rate (TER) when 4 or 5 genuine signatures were used for training. Also it is observed that the False Acceptance Rate (FAR) of the proposed system decreases as the number of genuine training samples increases.


International Journal on Document Analysis and Recognition | 2012

Automatic processing of handwritten bank cheque images: a survey

R. Jayadevan; Satish R. Kolhe; Pradeep M. Patil; Umapada Pal

Bank cheques (checks) are still widely used all over the world for financial transactions. Huge volumes of handwritten bank cheques are processed manually every day in developing countries. In such a manual verification, user written information including date, signature, legal and courtesy amounts present on each cheque has to be visually verified. As many countries use cheque truncation systems (CTS) nowadays, much time, effort and money can be saved if this entire process of recognition, verification and data entry is done automatically using images of cheques. An attempt is made in this paper to present the state of the art in automatic processing of handwritten cheque images. It discusses the important results reported so far in preprocessing, extraction, recognition and verification of handwritten fields on bank cheques and highlights the positive directions of research till date. The paper has a comprehensive bibliography of many references as a support for researchers working in the field of automatic bank cheque processing. The paper also contains some information about the products available in the market for automatic cheque processing. To the best of our knowledge, there is no survey in the area of automatic cheque processing, and there is a need of such a survey to know the state of the art.


International Journal of Computer Applications | 2013

Survey on Intrusion Detection System using Machine Learning Techniques

Sharmila Wagh; Vinod K. Pachghare; Satish R. Kolhe

In today’s world, almost everybody is affluent with computers and network based technology is growing by leaps and bounds. So, network security has become very important, rather an inevitable part of computer system. An Intrusion Detection System (IDS) is designed to detect system attacks and classify system activities into normal and abnormal form. Machine learning techniques have been applied to intrusion detection systems which have an important role in detecting Intrusions. This paper reviews different machine approaches for Intrusion detection system. This paper also presents the system design of an Intrusion detection system to reduce false alarm rate and improve accuracy to detect intrusion.


international conference on document analysis and recognition | 2011

Database Development and Recognition of Handwritten Devanagari Legal Amount Words

R. Jayadevan; Satish R. Kolhe; Pradeep M. Patil; Umapada Pal

A dataset containing 26,720 handwritten legal amount words written in Hindi and Marathi languages (Devanagari script) is presented in this paper along with a training-free technique to recognize such handwritten legal amounts present on Indian bank cheques. The recognition of handwritten legal amount words in Hindi and Marathi languages is a challenging because of the similar size and shape of many words in the lexicon. Moreover, many words have same suffixes or prefixes. The recognition technique proposed is a combination of two approaches. The first approach is based on gradient, structural and cavity (GSC) features along with a binary vector matching (BVM) technique. The second approach is based on vertical projection profile (VPP) feature and dynamic time warping (DTW). A number of highly matched words in both the approaches are considered for the recognition step in the combined approach based on a ranking scheme. Syntactical knowledge related to the languages is also used to achieve higher reliability. To the best of our knowledge, this is the first work of its kind in recognizing handwritten legal amounts written in Hindi and Marathi. Researchers interested in the dataset can contact the authors to get it through a shared link.


international conference on emerging trends in engineering and technology | 2009

Face Recognition by PCA Technique

A. M. Patil; Satish R. Kolhe; Pradeep M. Patil

Face recognition is one of the most active research areas in computer vision and pattern recognition with practical applications. This work proposes an apperence based Eigenface technique. PCA is used in extracting the relevant information in human faces. In this method the Eigen vectors of the set of training images are calculated which define the face space. Face images are projected on to the face space which encodes the variation among known face images. These encoded variations are used for recognition. Experiments are carried on IndianFace Database; the obtained recognition rate is 92.30%. The same training set is tested with nonface database.


international conference on data mining | 2014

Effective intrusion detection system using semi-supervised learning

Sharmila Kishor Wagh; Satish R. Kolhe

Network security is a very important aspect of internet enabled systems in the present world scenario. As the internet keeps developing the number of security attacks as well as their severity has shown a significant increase. Due to intricate chain of computers the opportunities for intrusions and attacks have increased. Therefore it is need of the hour to find the best ways possible to protect our systems. Every day new kind of attacks are being faced by industries. Hence intrusion detection system are playing vital role for computer security. The most effective method used to solve problem of IDS is machine learning. Getting labeled data does not only require more time but it is also expensive. Labeled data along with unlabeled data is used in semi-supervised methods. The rising field of semi-supervised learning offers a assured way for complementary research. In this paper, an effective semi-supervised method to reduce false alarm rate and to improve detection rate for IDS is proposed.


Archive | 2016

Machine Learning Using K-Nearest Neighbor for Library Resources Classification in Agent-Based Library Recommender System

Snehalata B. Shirude; Satish R. Kolhe

Agent-based library recommender system is proposed with the objective to provide effective and intelligent use of library resources such as finding right book(s), relevant research journal papers, and articles. It is composed of profile agent and library recommender agent. Library recommender agent performs the main task of filtering and providing recommendations. Library resources include book records having table of contents and journal articles including abstract and keywords. This provides availability of rich set of keywords to compute similarity. The library resources are classified into fourteen categories specified in ACM computing classification system 2012. The identified category provides a way to obtain semantically related keywords for the library resources. The results of k-Nearest Neighbor (k-NN) for library recommender system are encouraging as there is improvement in the existing results. Use of ACM CCS 2012 as ontology, semantic similarity computation, implicit auto update of user profiles, and variety of users in evaluation are the features of the complete recommender system which makes it useful and novel. This paper details classification of library resources performed by library recommender agent.


International Journal of Electronic Security and Digital Forensics | 2015

Effective semi-supervised approach towards intrusion detection system using machine learning techniques

Sharmila Kishor Wagh; Satish R. Kolhe

Network security plays a very important role in todays web enabled world. In the 21st century, network traffic has increased because of the enormous growth in online users and their online communication. The number of security attacks is an increased with increase in internet users. The frequency and severity of such attacks have shown a great impact on network performance. Many classical machine learning algorithms have been proposed to solve the problem of intrusion detection with varying levels of success. Nowadays, availability of libelled data is a big issue. It is not only time consuming, but also expensive. Semi-supervised learning methods can make use of unlabelled examples in addition to the labelled ones. The developing field of semi-supervised learning, offers a promising direction for supplementary research. In this paper, we introduce a new semi-supervised mechanism for intrusion detection, which efficiently reduces false alarms, still maintaining a high detection rate. In our proposed semi-supervised learning approach, only a small quantity of labelled data and a large amount of unlabelled data has been used. This will improve the overall network security by reducing the security administrators efforts and making the alert mechanism more practical.


international conference on information systems | 2014

Measuring similarity between user profile and library book

Snehalata B. Shirude; Satish R. Kolhe

In the development of recommender system either the content or collaborative filtering is necessary. To filter the records it is required to measure the similarity between profile of user and items present in the dataset. This experiment is performed on the dataset containing 978 books related to computer science field and 7 users. Similarity between profile of user and contents of book is measured using Euclidean, Manhattan, Minkowski, Cosine distances. The results are evaluated and compared. This work is useful in the development of library recommender system.

Collaboration


Dive into the Satish R. Kolhe's collaboration.

Top Co-Authors

Avatar

Snehalata B. Shirude

North Maharashtra University

View shared research outputs
Top Co-Authors

Avatar

Pradeep M. Patil

Vishwakarma Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Manoj P. Patil

North Maharashtra University

View shared research outputs
Top Co-Authors

Avatar

Manisha S. Deshmukh

North Maharashtra University

View shared research outputs
Top Co-Authors

Avatar

Umapada Pal

Indian Statistical Institute

View shared research outputs
Top Co-Authors

Avatar

Sharmila Wagh

North Maharashtra University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

B. V. Pawar

North Maharashtra University

View shared research outputs
Top Co-Authors

Avatar

Milind E. Rane

Vishwakarma Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Praveen S. Patil

North Maharashtra University

View shared research outputs
Researchain Logo
Decentralizing Knowledge