S. Ranjitha Kumari

Learn More
Now a days sharing the information over internet is becoming a critical issue due to security problems. Hence more techniques are needed to protect the shared data in an unsecured channel. The present work focus on combination of cryptography and steganography to secure the data while transmitting in the network. Firstly the data which is to be transmitted(More)
Anomaly Intrusion Detection System is used to identify a new attack in the network by identifying the deviations in the network traffic patterns. Though it identifies new attacks efficiently, the false alarm rate is usually high in this system. As there may be attack in the network at any time and as the input traffic varies over time, we need a model which(More)
CONTEXT To evaluate the efficacy of diffusion fiber tractography (DFT) and voxel-based morphometry (VBM) for lateralizing language in comparison with functional magnetic resonance imaging (fMRI) to noninvasively assess hemispheric language lateralization in normal healthy volunteers. AIMS The aim of the present study is to evaluate the concordance of(More)
Anomaly Intrusion Detection System is used to identify a new attack in the network by identifying the deviations in the network traffic patterns. Though it identifies new attacks efficiently, the false alarm rate is usually high in this system. As there may be attack in the network at any time and as the input traffic varies over time, we need a model which(More)
Unlike traditional routing schemes that route all traffic along the same path, multipath routing method split the traffic among several paths in order to ease congestion. It has been recognized by many that multipath routing can be fundamentally more efficient than the traditional approach of routing along single paths. Yet, in contrast to the single path(More)
  • 1