Anoop M. Namboodiri

Learn More
Recent advances in on-line data capturing technologies and its widespread deployment in devices like PDAs and notebook PCs is creating large amounts of handwritten data that need to be archived and retrieved efficiently. Word-spotting, which is based on a direct comparison of a handwritten keyword to words in the document, is commonly used for indexing and(More)
We present a complete online handwritten character recognition system for Indian languages that handles the ambiguities in segmentation as well as recognition of the strokes. The recognition is based on a generative model of handwriting formation, coupled with a dis-criminative model for classification of strokes. Such an approach can seamlessly integrate(More)
The most prevalent peptide in the nervous system, N-acetylaspartylglutamate (NAAG), specifically activates N-methyl D-aspartate (NMDA) receptors and a subclass of metabotropic glutamate receptors. One action of this peptide may be to modulate the release of other neurotransmitters, including gamma-aminobutyric acid (GABA). The present study describes the(More)
Automatic identification of handwritten script facilitates many important applications such as automatic transcription of multilingual documents and search for documents on the Web containing a particular script. The increase in usage of handheld devices which accept handwritten input has created a growing demand for algorithms that can efficiently analyze(More)
Quinolinate (QUIN), a metabolite in the kynurenine pathway of tryptophan degradation and a neurotoxin that is thought to act through the NMDA receptor system, was localized in cultured peripheral blood monocytes/macrophages from SIV-infected monkeys using a recently developed immunohistochemical method. Significant increases in QUIN immunoreactive (IR)(More)
Concerns on widespread use of biometric authentication systems are primarily centered around template security, revocability, and privacy. The use of cryptographic primitives to bolster the authentication process can alleviate some of these concerns as shown by biometric cryptosystems. In this paper, we propose a <i>provably secure</i> and <i>blind</i>(More)
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of introducing privacy and security in such a practical surveillance system has been stifled by the enormous computational and communication overhead required by the solutions. In this(More)