Papers by chaitanya kulkarni
Journal of Radiology Case Reports, 2011
Pediatric Radiology: Accessory parotid gland with ectopic fistulous duct-Diagnosis by ultrasonogr... more Pediatric Radiology: Accessory parotid gland with ectopic fistulous duct-Diagnosis by ultrasonography, digital fistulography, digital sialography and CT fistulography. A case report and review of current literature.

Journal of Radiology Case Reports, 2011
Isomerism or Heterotaxy syndromes are rare multifaceted congenital anomalies with multi-system in... more Isomerism or Heterotaxy syndromes are rare multifaceted congenital anomalies with multi-system involvement. Grouped under the broad category of Situs Ambiguous defects, these often pose diagnostic difficulties due to their varied and confusing anatomy. Since patients rarely survive into adulthood due to cardiovascular complications, the etiology and natural history of such conditions are not fully understood. Imaging provides the most accurate non invasive method for diagnosis and thereby, prognosis in such cases. We present a case of right sided Isomerism with complex cardiac anomalies in a 17 year old adolescent, who presented with dysphagia as one of the main complaints. Multi modality imaging demonstrated the intricate abnormalities in vital systems. CASE REPORT A 17 year old male was referred with complaints of dysphagia, cough since 4-5 days with one episode of blood in sputum, and episodic exertional breathlessness.

Artificial Intelligence Review, 2022
The rapid growth of Internet-based applications, such as social media platforms and blogs, has re... more The rapid growth of Internet-based applications, such as social media platforms and blogs, has resulted in comments and reviews concerning day-today activities. Sentiment analysis is the process of gathering and analyzing people's opinions, thoughts, and impressions regarding various topics, products, subjects, and services. People's opinions can be beneficial to corporations, governments, and individuals for collecting information and making decisions based on opinion. However, the sentiment analysis and evaluation procedure face numerous challenges. These challenges create impediments to accurately interpreting sentiments and determining the appropriate sentiment polarity. Sentiment analysis identifies and extracts subjective information from the text using natural language processing and text mining. This article discusses a complete overview of the method for completing this task as well as the applications of sentiment analysis. Then, it evaluates, compares, and investigates the approaches used to gain a comprehensive understanding of their advantages and disadvantages. Finally, the challenges of sentiment analysis are examined in order to define future directions.

In this survey paper, we tend to study land classification from two-dimensional high<br> re... more In this survey paper, we tend to study land classification from two-dimensional high<br> resolution satellite pictures victimization Hadoop framework. Propelled picture process<br> calculations that need higher system control with monstrous scale inputs is prepared with<br> productivity exploitation the parallel and dispersed procedure of HadoopMapReduce<br> Framework. HadoopMapReduce could be a climbable model that is fit for process petabytes<br> information with enhanced adaptation to non-critical failure and information closeness.<br> During this paper we tend to gift a MapReduce framework for acting parallel remote sensing<br> satellite processing victimization Hadoop and storing the output in HBase. The speed and<br> performance show that by utilizing Hadoop, we are able to distribute our employment across<br> completely different clusters to require advantage of combined process power on goods<br> hardware.

Duplicated code is harmful for maintaining and evolving the source code in software systems. The ... more Duplicated code is harmful for maintaining and evolving the source code in software systems. The refactorability supports to remove the software clones and checking the unification while merging the duplicated code. An approach for automatically pair the clones that can be refactored without changing the behavior of program is needed. There is a problem by using the support of removing the clones from the source code through refactoring because they are having more modification in the code that may not support. The proposed approach will examine differences between clones that can be safely parameterized without causing any side-effects. The computational cost of the proposed approach is negligible (less than a second) in the huge majority of the examined outcomes. The clones will be detected by tools which are discussed by clone types. Input to detect the clones is source code which consists of set of statements and preconditions. By using Program Dependence Graph (PDG) mapping and...

An Effective Approach to Find Refactoring Opportunities for Detected Code Clones
In the evolution and maintenance of software clone codes that is copied code is potentially harmf... more In the evolution and maintenance of software clone codes that is copied code is potentially harmful. This is very serious problem in software evolution and maintenance. But by using concept refactoring, there is little bit support for eliminating software clones because major challenging problem is nothing but unification and merging of the duplicated code. This paper describes an approach which takes input as a source code from which it will detect the clones. Then it will checks that which clones are refactorable safely without changing the program behavior and which are not. Existing approach was able to check it for clone pair i.e. only two clone fragments which are detected as clones. So here is the approach which overcomes this drawback of existing system. One of the advantages of this approach that it is having less or let’s say almost negligible computational cost.

A qualitative approach for refactoring of code clone opportunities using graph and tree methods
2016 International Conference on Information Technology (InCITe) - The Next Generation IT Summit on the Theme - Internet of Things: Connect your Worlds, 2016
Reusing of code has been a very common practice in software development. This practice has been i... more Reusing of code has been a very common practice in software development. This practice has been implemented to reduce programming time and efforts greatly. This copying and pasting behavior of programmers leads to cloning of codes and therefore has a very serious impact on the maintenance of the software systems. Many clone detection tool has been proposed to find out the copied code. However, refactoring of code is still a challenging part as most of the ongoing tools depend on detection of clone rather than the ability to make decision on refactorability. These tools do not guarantee whether such codes can be safely refactored or not. Our aim mainly lies on detecting the possibility of refactoring a code. To find out whether the code clone can be securely refactored or not, three methods are applied: Nesting Structure Mapping, Statement Mapping and Precondition Examination. In order to refactor the code, we apply some techniques like Pull-Up Method and Push-Down Method. In our app...

In software engineering field of code clone recognition, which essentially comprises of the locat... more In software engineering field of code clone recognition, which essentially comprises of the location of the code clones thatis acquainted in programming due with reuse approach amid improvement of programming. At the advancement stage for simplicity of programming, the developers reuse the code by slight adjustments. In the event that the product has a high level of likelihood clones, it might bring about numerous issues for the product, from the support perspective. There are numerous apparatuses accessible, however yet exactness required in clone location can't be guaranteed to amazing degree. A portion of the apparatuses accessible don't identify clones with great effectiveness, Moreover they devour a considerable measure of time. The aim of this proposition is to reveal the method by which proposed instrument can effectively recognize different sorts of clones with proficient adaptability and striking streamlining.

International Journal of Computer Applications
Health care domain have attracted considerable amount of research fields. One of the field that h... more Health care domain have attracted considerable amount of research fields. One of the field that has a drastic focus on health care domain is data mining. Mainly health care system focuses on some data mining theories like classification, clustering etc. The backbone in the domain of data mining is the data itself. For any field that is related to data mining, the data should be reliable and huge. System is working on patient's medical data i.e. electronic health record. A large amount of diagnosed patient's medical test data is stored electronically on a local machine. The aim is to provide such an unwavering service to the patient so that the patient should have complete knowledge of their disease before going for diagnosis. A system can predict the disease by considering few parameters of the patient's test. Patient's disease can be easily detected without wasting days for waiting for their test's results. This prediction system is implemented by using classification algorithm i.e. semi-supervised heterogeneous graph-based algorithm. The Proposed system should be compatible to provide not only the prediction but should also calculate their prescription, dosage, and health checkup status. Proposed system does not only benefit the patients but the doctors. k-means algorithm is implemented for
Cannabinoid Receptor Modulators
Uploads
Papers by chaitanya kulkarni