P. Sojan Lal

Learn More
— Software obfuscation or obscuring a software is an approach to defeat the practice of reverse engineering a software for using its functionality illegally in the development of another software. Java applications are more amenable to reverse engineering and re-engineering attacks through methods such as decompilation because Java class files store the(More)
Reference point identification is important in automatic fingerprint recognition system as it can be used to align fingerprints in a correct orientation in spite of the possibility of different transformations in fingerprint images. It is also used in fingerprint classification, as it is desirable to classify fingerprint images for forensic type(More)
Web Usage Mining also known as Web Log Mining is the extraction of user behaviour from web log data. The log files also provide immense information about the search engine traffic at a website. This search engine traffic is helpful to analyse the ethics of search engines, quality of the crawlers, periodicity of the visits and also the server load. Search(More)
(CAIN) of information. Oracle 8i, 9i and 11g Databases support SQLJ framework allowing embedding of SQL statements in Java Programs and providing programmer friendly means to access the Oracle database. As cloud computing technology is becoming popular, SQLJ is considered as a flexible and user friendly language for developing distributed applications in(More)
The use of advanced diagnostics in guiding treatment decisions that are tailored to individual risks and benefits is becoming increasingly acknowledged as the future of healthcare. People search healthcare web portals for inquiry of diseases and by analyzing the web access logs combining with their individual profiles, many patterns can be mined. Trajectory(More)