Arputharaj Kannan

Learn More
Rapid growth in the Internet usage and diverse military applications have led researchers to think of intelligent systems that can assist the users and applications in getting the services by delivering required quality of service in networks. Some kinds of intelligent techniques are appropriate for providing security in communication pertaining to(More)
Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of(More)
Most intrusion detection systems for mobile ad hoc networks are focusing on either routing protocols or MAC layer traffic. This paper focuses on the design of a new anomaly detection system for each node of the network, which contains detection subsystem for MAC layer, routing layer and application layer. Audit data taken from MAC level/network(More)
Intrusion Detection Systems have been used along with various techniques to detect intrusions in networks, distributed databases and web databases. However, all these systems are able to detect the intruders with high false alarm rate. In this paper, we propose a new intrusion detection model using the combination of outlier detection method and multiclass(More)
Segmentation of lung tissue is an important and challenging task in any computer aided diagnosis system. The accuracy of the segmentation subsystem determines the performance of the other subsystems in any computer aided diagnosis system based on image analysis. We propose a novel technique for segmentation of lung tissue from computed tomography of the(More)
In the modern health service, data are accessed by doctors and nurses using mobile, Personal Digital Assistants, and other electronic handheld devices. An individual's health related information is normally stored in a central health repository and it can be accessed only by authorized doctors. However, this Data is prone to be exposed to a number of mobile(More)
The traditional process of focused Web crawler is to harvest a collection of Web documents that are focused on the topical subspaces. The intricacy of focused crawlers is identifying the next most important and relevant link to follow. Focused crawlers mostly rely on probabilistic models for predicting the relevancy of the documents. The Web documents are(More)