Srinivasan Nagaraj

Learn More
— Now a days, the challenge for many educational institutions is to make their students do better in their exams and secure good percentage of marks so that many of them get placed in reputed multinational companies. If the educational institutions are able to predict the percentage of marks that the students are going to secure in their final exams, it(More)
This paper presents a design method for optimizing software-testing efficiency by identifying the most critical path clusters in a program. This is done by the application of soft computing techniques, specifically genetic algorithms. We develop a genetic algorithm that selects the software path clusters to test, which are weighted in accordance with the(More)
Given a list of n strings of length at most k, where l is length of the largest string. The object is to cover the strings by a minimal number of regular expressions r1, r2, r3………………..,r m for m≥1,such that a) Every string in the database satisfies at least one r i and b) Any string 'X' of length at most K satisfying r 1 +r 2 +r 3 +……………….+r m is at a(More)
In this paper we show how implemented one time security encryption scheme is more lucid, effective. However it is more complex in nature of attacker view. The one-time pad encryption scheme itself is mathematically unbreakable. (See Claude Shannon's "Communication Theory of Secrecy Systems"). Therefore, the attacker will focus on breaking the key instead of(More)
are polled for their presence, shared memory is created for the connected systems and the files are uploaded to the shared memory. The file can then be downloaded on to the personal systems hard disk or can either be deleted / modified according to the usage of that file. The objective of this paper is to develop a software product that will assist the work(More)
The idea to use texture analysis in medical imaging has been considered since the early 1970s. However, the exciting evolution of both texture analysis algorithms and computer technology revived researchers' interest in applications for medical imaging in recent years. Technical innovations in medical cross-sectional imaging have opened up new vistas for(More)
T h e threat of key exposure becoming more acute as cryptographic computations are performed more frequently on poorly protected devices (smart-cards, mobile phones, even PCs), new techniques are needed to deal with this concern. One promising approach which we focus on here is to construct forward secure cryptosystems. The existence of non-trivial,(More)
The internet is the one of the greatest revolutionary innovation of the twentieth century. It made the 'global village utopia' a reality in a rather short span of time and the ways that computers communicate have, in many cases, changed dramatically. The core problem, the 32-bit address space that is too small for the current and future size of the(More)
In this paper, Mirror sites enable client requests to be serviced by any of a number of servers, reducing load at individual servers and dispersing network load. Typically a client requests service from a single mirror site. We suggest a way for the client to access a file from multiple mirror sites in parallel to speed up the download. We have developed a(More)