B. Vijaya Saranya

Learn More
Clone Detection has considerably evolved over the last decade, leading to approaches with better results but with increasing complexity. Most of the existing approaches are limited to finding program fragments similar in their syntax or semantics, while the fraction of candidates that are actually clones and fraction of actual clones identified as(More)
Molecular characterization of 23 cytogenetically confirmed XY females was attempted by screening coding regions of SRY and androgen receptor (AR) genes. Five of the index cases showed sequence variations in various exons of the AR gene: a deletion (n.1911delG) and substitutions n.1761G >A and n.1317C >T in exon 1; n.3510C >T transition in exon 6 and(More)
There are so many obstacles in developing a vaccine or vaccine technology for diseases like cancer and human immunodeficiency virus infection. While developing vaccines that target specific infection, molecular adjuvants are indispensable. These molecular adjuvants act as a vaccine delivery vehicle to the immune system to increase the effectiveness of the(More)
In the world of internet and more use of wireless technology, there is increasing claim for internet in vehicles. Due to this purpose VANET is playing an important part in inter-vehicular as well as infrastructure based communication in Intelligent Transport Systems (ITS). These systems are aimed at addressing critical issues like passenger safety and(More)
Opportunistic networks are formed by small devices that communicate over a wireless link with each other. Opportunistic network possess various heterogeneous resources. Resource management and scheduling of these heterogeneous resources are major problems in the Opportunistic network due to highly dynamic behavior of the devices in the opportunistic(More)
For specific data processing activities a data distributor has to give the sensitive data to a set of third party agents. The distributor's copy of data that had been transmitted to agents may be leaked by any of them. It is necessary to identify the agents that have leaked data. To improve the chances of detecting leakage data and the guilty agents,(More)
  • 1