S. Sankara Gomathi

Learn More
  • P Edith Linda, V Manju Bashini, S Gomathi
  • 2011
— The main aim of this paper is to integrate the different object oriented metric tools and make them available as a single add-on. The first part of this paper analyzed five different tools and they are migrated into one to make use of those tools in efficient manner. 1 I NTRODUCTION HE emerging Object oriented programming is most widely used by the(More)
  • S Gomathi, V Ambikapathy, A Pannerselvam, A V V M Sri Pushpam
  • 2011
The present investigation deals with the population of soil fungi in chilli field of Thiruvarur District. The antibiotic ability and potential strain of Trichoderma spp.isolated from chilli field soil were used against damping off disease and its tolerance to antibiotics. Among the soil fungi, tested Trichoderma spp. showed maximum activity in controlling(More)
– Maintenance of the cache consistency is a complicated issue in the wireless mobile environment. Caching of frequently accessed data items on the node can reduce the bandwidth requirement of the mobile node environment. In this paper, we present a new technique called Modified Energy Efficient Cache Invalidation Algorithm (MEECIA) especially to reduce the(More)
  • S Gomathi, M Jagatheesan, Research Scholar, M Phil, Associate Professor
  • 2015
— Many denoising algorithms are designed to recover a noise infected image. However, most of them cannot well recover a significant noise dirtied image with noise density higher than seventy percentages. A brand new approach projected to remove background noise with efficiency by detecting and modifying noisy pixels in a picture. If the middle pixel of a(More)
— Bucketization is the splitting of large amount of data into smaller chunks and storing the parts in different sub servers called buckets. This paper deals with ordered bucketization (OB), which makes use of a random key generator algorithm and a deterministic bucketing algorithm, to propose a secure storage and retrieval system for multimedia files. In(More)
Interconnected systems, such as Web servers, database servers, cloud computing servers etc, are now under threads from network attackers. As one of most common attack is Denial of Service (DoS) these attacks cause serious impact on computing systems. The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless(More)
  • S Gomathi, R Poonkuzhali, K Duraiswamy, Dean, K S Rangasamy
  • 2011
Current research on routing protocols for Mobile Ad-hoc NETwork (MANET) has converged to several dominating routing protocols, including Optimized Link State Routing (OLSR), Ad-hoc On-demand Distance Vector (AODV) and Dynamic Source Routing (DSR). At the same time, classic routing protocols such as Open Shortest Path First (OSPF) and Destination Sequenced(More)