J. Seetha

Learn More
Security features must be addressed when escalating a distributed database. The choice between the object oriented and the relational data model, several factors should be considered. The most important of these factors are single and multilevel access controls (MAC), protection and integrity maintenance. While determining which distributed database replica(More)
Biomedical image acquisition mechanism endows vital information pertaining to anatomy and supports contemporary quantitative image analysis which eases the work in diagnosing and treating the patients effectively. One of the frequently used tools for such diagnosis and treatment assessment has been Magnetic Resonance Imaging (MRI). However, the images(More)
For detecting pleural effusion and pneumothorax, which affect the pleural membranes of the lungs, Computer Aided Diagnosis system (CAD) is proposed. The chest CT slices are initially preprocessed to remove the Gaussian noise by using a sigma filter segmentation technique used here extracts the lungs and the regions affected by pleural effusion using(More)
Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerant Networks (DTNs).We propose an iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust establishment. The basic idea of iTrust is introducing a periodically available Trusted Authority (TA) to judge the node's(More)
  • 1