Srinivasan Nagaraj

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Kishore Bhamidipati2
Asst Professor1
2Kishore Bhamidipati
1Asst Professor
1K Koteswararao
1M Ramachandra
1Gsvp Raju
Learn More
The availability of Low cost and high performance workstations connected by a high-speed network has made distributed computing an attractive and inexpensive mechanism to exploit parallelism at functional level present in the user or application programs. A distributed system can be used effectively by its end users only if its software presents a single(More)
This paper presents a design method for optimizing software-testing efficiency by identifying the most critical path clusters in a program. This is done by the application of soft computing techniques, specifically genetic algorithms. We develop a genetic algorithm that selects the software path clusters to test, which are weighted in accordance with the(More)
The idea to use texture analysis in medical imaging has been considered since the early 1970s. However, the exciting evolution of both texture analysis algorithms and computer technology revived researchers' interest in applications for medical imaging in recent years. Technical innovations in medical cross-sectional imaging have opened up new vistas for(More)
The existing system consisted of files with literally no file security. The main issue of Reading or tapping data is secrecy and confidentiality. Confidentiality has always played an important role in diplomatic and military matters. Often Information must be stored or transferred from one place to another without being exposed to an opponent or enemy. The(More)
In this paper we show how implemented one time security encryption scheme is more lucid, effective. However it is more complex in nature of attacker view. The one-time pad encryption scheme itself is mathematically unbreakable. (See Claude Shannon's "Communication Theory of Secrecy Systems"). Therefore, the attacker will focus on breaking the key instead of(More)
  • 1