S. Karthika

Learn More
The homeland security has become a very significant consideration for all the Governments throughout the world. To improve the OPerational SECurity (OPSEC), multi relational graphs were introduced for Covert Network Analysis (CNA). In this paper, proposed SpyNetMiner system identifies the key players who maximally influence the covert network. Abnormality(More)
In recent days terrorism poses a threat to homeland security. The major problem faced in network analysis is to automatically identify the key player who can maximally influence other nodes in a large relational covert network. The existing centrality based and graph theoretic approach are more concerned about the network structure rather than the node(More)
In recent day's terrorism poses a threat to homeland security. It's highly motivated by the “net-war” where the extremist are organized in a network structure. The knowledge discovery process in network analysis has been done using supervised and unsupervised techniques which helps us to differentiate overt and covert nodes in a social(More)
The future mobile communication system will be distinguished by high integration of services, flexibility and higher throughput. Thus, the rapid growth in traffic volume and increase in new services has begun to change the configuration and structure of wireless networks. In the past, WiMAX has gained lot of interest for providing broadband communication.(More)
Security is the biggest challenge in MANET. MANET presents various types of security attacks on data exchanges taking place between source and destination. In this misbehavior detection schemes for conventional wireless networks has opposed black hole attack and malicious node occur routing, this proposed technique as a great challenges in networks. In this(More)
  • Mrs R Sridevi, S Karthika, Assistant Professor
  • 2014
This paper presents a narrative key generation scheme using biometric methodology for providing high security over the internet applications such as VoIP technology. The present work deals with modern computing systems security issues, focusing on biometric based asymmetric key generation process. The term VoIP refers-" voice over internet protocol (IP) "(More)
In this paper, the authors propose a naïve methodology, IBeH, for detecting the community structure of the covert network. Unlike most of the existing methods, IBeH, considers the roles, contribution metric and similarity of the actor profiles. The proposed method computes the reciprocating factor among the actors using the contribution metric rather(More)
The homeland security has become a very significant consideration for all the Governments throughout the world. To improve the OPerational SECurity (OPSEC), multi relational graphs were introduced for Covert Network Analysis (CNA). In this paper, proposed SpyNetMiner system identifies the key players who maximally influence the covert network. Abnormality(More)
Ceramic tiles have become very popular and are used in the flooring of offices and shopping malls. As testing the quality of tiles manually in a highly polluted environment in the manufacturing industry is a labor-intensive and time consuming process, analysis is carried out on the tile images. This paper discusses an automated system to detect the defects(More)
In the social world the sharing of knowledge, data's and concepts within a group is done through the network of interactions and relationships. A community is formed by a group of individuals of same interest to share common values within themselves at a higher rate than outside the community. It can be a social unit of any size. The significant chore while(More)