Wednesday, September 5, 2012

Project name and student who under took the project for our reference please go through it

BATCH  (2007-11)

S.NO

Name of the student

Project Title

Related to subject

SEM

Sub code

Sub name

1

R.Packiyalakshmi

Diffusion tensors for sheared and rotated rectangles

V

CS1302

Computer networks

2

S.Sudharani

Secret sharing using authenticated group key transfer protocol

VII

IT1352

Cryptography and network security

K.Sona

T.Kavitha

3

P.Saranya

Half tone visual cryptography

VII

CS1014

Information security

4

S.Gayatri

Secure arithmetic code

VII

IT1352

Cryptography and network security

P.Kaviya

5

K.Vasanthi

Retrieval of source images degraded through unknown blur operators

VIII

EC1009

Digital image processing

S.Parveen banu

M.Sathya

6

S. Janani

Robust background initialization of a heavily cluttered and poor lighted video

VIII

EC1009

Digital image processing

R.Vigneshwari

7

A.Sunitha

Rate distortion efficient piecewise planar 3-D scene representation

VIII

EC1009

Digital image processing

R.Tamil Elakkiya

J.Jasmine

8

S.Sujitha

Non-invasive biometric authentication for mobile banking

VII

IT1352

Cryptography and network security

D.Poorna Meenakshi

R.Premi Keerthiga

9

R.V.Rameela

Packet pacing in small buffered optical packet switched network

V

CS1302

Computer networks

B.Brindha

C.Srinivethini

10

B.Kowsalya

Enhancing file distribution performance through peer to peer networks

V

CS1302

Computer networks

M.Sharmila Devi

S.Fathima Shuruma

11

P.NavaneethaKrishnan

Flexible rollback recovery in dynamic heterogeneous grid computing

V

CS1302

Computer networks

J.Balachandar

G.Vigneshraja

12

D.Kumaran

DDOS – Resilient Scheduling to Counter application Layer Attacjs under Imperfect detection

V

CS1302

Computer networks

S.S.Karthikkumar

S.Jeyakumar

13

A.Arun Paarthi

General game player

VI

CS1354

Graphics and multimedia

V.Jegan

P.Hari hara sudhan

14

P.Rajkumar

Enhancing the flexibility and extra information of manufacturing system using RFID

VIII

IT1402

Mobile Computing

A.Deepan

R.Karthik

15

R.Mayandi

Color extended visual cryptography

VII

CS1014

Information security

P.Ramamoorthi

K.Pandiarajan

16

V.B.Bharath

Recognition of affective states of humans

VIII

EC1009

Digital image processing

S.Vijaykumar

17

S.Aswin Karthik

Wearable and mobile system to  manage remotely heart failure

VIII

IT1402

Mobile Computing

M.Dhanabal

S.Arun

18

I.Bibul Shivaram

Fault resistive parallel computing

VIII

CS1017

ParallelComputing

G.Senthilraj

R.Sithik

19

J.S.Richard Jim Reeves

Real time Speech to text conversion

VII

CS1351

Artificial Intelligence

M.Sathiya Sankar

S.P.Gokul

 

BATCH  (2006-2010)

S.NO

Name of the student

Project Title

Related to subject

1

R.Monisha

 

Encryption Based on Visual Cryptography and D-H Key agreement scheme

SEM

Sub code

Sub name

V.Lalitha

 

VII

IT1352

Cryptography and Network Security

P.Lingeshwari

2

R.Varshini

Authentication of Intended users by Graphical CAPTCHAs

VII

IT1352

Cryptography and Network Security

S.Kannika Parameswari

M.Punithavathi

3

K.Lakshmi Priya

Personal Authentication Using Finger Knuckle Surface

VII

IT1352

Cryptography and Network Security

V.Nithya

4

K.Pandiselvi

Mobility and routing messages in partitioned network using context information

V

CS1302

Computer Networks

S.Muthumari

G.Radha

5

G.Dhavamalar Vinola

Detecting Malicious Packet losses using Compromised Router Detection Protocol

V

CS1302

Computer Networks

P.Tharini

6

M.P.Shanmugapriya

Fault prediction using conceptual Cohesion of classes in Object Oriented systems

VII

CS1402

Object Oriented Analysis and Design

P.V.Eswari Priya

C.Kiruthika

7

R.Jegatheeswari

Flawless Rejuvenation of watermarked Image using DE Algorithm

VIII

EC1009

Digital Image Processing

 

Y.Vetri Selvi

E.Tamil Nila

8

V.Asis Marceline

On color Texture normalization for active appearance model

VIII

EC1009

Digital Image Processing

 

B.Rajeswari

V.Priadarsini

9

R.Anuja

Authentication of Individuals using Palm Dorsal vein pattern and Knuckle Shape

VIII

EC1009

Digital Image Processing

 

A.Gayathri

B.Durga Devi

10

R.J.Babitha

Secured communication in computationally constrained Environment

VII

IT1352

Cryptography and Network Security

R.Guna Chitra

A.Hendry Roselin Mary

11

S.V.Naveenkannan

Color Image Segmentation for Apple Grading

VII

EC1009

Digital Image Processing

 

S.Jeyaganesh

A.Subamanikandan

12

M.B.Vignesh Kumar

Enhancing Search Performance in unstructured P2P networks based on users' common interest

V

CS1302

Computer Networks

P.AnnamalaiKarthikeyan

P.Rajesh Kumar

13

P.Deepan

Content Based Image Retrieval using Color Histogram

VIII

EC1009

Digital Image Processing

 

D.Guruprasath

S.K.Arun

14

D.Philip

Monitoring the Application layer DDOS attacks for popular websites

VII

IT1352

Cryptography and Network Security

 

 

 

P.Ponperumal

K.Elangovan

15

J.Vasantha Rajan

A Trusted System for Confidential Asset Transportation and Vehicle Monitoring using GPS, GPRS, RFID and Imaging Devices

VIII

IT1402

Mobile Computing                                                                                                                             

P.Rajesh Kumar

P.Selvam

16

S.Arunraj

Extracting information from Radiology Reports using text mining

VI

CS1004

Data Warehousing and Mining

S.Subramani

D.Vadivel

17

J.Avinash

An efficient Search strategy based on user category

VII

CS1401

Internet Programming

T.Shiva

G.Samkumar

18

K.Krishnan

A novel approach to steganography based authentication

VII

IT1352

Cryptography and Network Security

P.Saravana Kumar

M.Dinesh Kannan

19

N.Vignesh Ram

Incremental learning of chunk data for online pattern classification systems

VI

CS1004

Datawarehousing

and Mining

A.Stalin Pusharaj

C.Karuppusamy

20

S.Vignesh

Active Learning Methods for Interactive Image Retrieval

VIII

EC1009

Digital Image Processing

 

D.Deepan

21

S.Swadeesh

Computerization of Co-operative Banks

V

CS1301

Database Management Systems

S.Prasanna Raja

J.Eugene Sam Jacob

22

J.Malarvizhi

A Method to detect blood vessel structure and exudates associated with diabetic retinopathy

VIII

EC1009

Digital Image Processing

 

A.Surya

 

 

 

BATCH ( 2005-2009)

S.NO

Name of the student

Project Title

Related to subject

1

Kannan.M

Automated periodicity detection in digital images

SEM

Sub code

Sub name

Muthu Kumar's

VIII

EC1009

Digital Image Processing

 

Ram Kumar.R.R

2

Raja sankar.R

Fractal image compression using region-based approach

VIII

EC1009

Digital Image Processing

 

Pradeepkumar.P

Adrian David.H

3

Vinoth.S

A self-organising visual surveillance system

VIII

EC1009

Digital Image Processing

 

Babu.S

Sathya Moorthi.P

4

Saranya Devi.R

Face recognition using eigen face approach

VIII

EC1009

Digital Image Processing

 

Ramya.U

Shanmugapriya.G

5

Kannika Parameswari.J

Text to speech recognition

VII

CS1351

Artificial Intelligence

Ramya.K

Surya.E

6

Madhu Malar Devi.A

A novel secret data sharing scheme based on block truncation coding

VII

IT1352

Cryptography and Network Security

Saranya Devi.J

Kavitha.J.R

7

Priyadharshini.T.B

Stepping up the rotation of high-resolution images

VIII

EC1009

Digital Image Processing

 

Anitha Devi.T

Chitradevi.S

8

Shanmugam.M

Illuminant color estimation using edge based color constancy technique

VIII

EC1009

Digital Image Processing

 

Manikandaprabhu.T

Vignesh.M

9

Amuthan.M

Hybrid region filing using         in painting techniques

VIII

EC1009

Digital Image Processing

 

Manikandamoorthy.M

Karthikeyan.R

10

Kavya.A

Face detection based on skin color using neural networks

VIII

EC1009

Digital Image Processing

 

Jothi.A

11

Sathiya Rama Prabha.M.P

A copyright protection using digital watermarking

VIII

EC1009

Digital Image Processing

 

Suganya Ananthi.M

Sathiya.R

12

Mathivaanan.R

Anti-phasing approach for safe browsing

VII

CS1401

InternetProgramming 

Manojkumar.K.R

Karthicksankar. S

13

Suganya. G

A fuzzy based relevance feedback CBIR algorithm

VIII

EC1009

Digital Image Processing

 

Vasantha Devi.S

Madhura.J

14

Deepan Raj.T

Enhanced file transfer protocol

V

CS1302

Computer Networks

Clement Lloyd

15

Dhilipan Rajha.R.A

Controlling IP spoofing through interdomain packet filters

V

CS1302

Computer Networks

Shanmuga Pradeepan.R

16

Arvindh.G.V

Interactive adaptation for mobile clients using existing APIs

VIII

IT1402

Mobile
Computing

Suresh Kumar.S

Pandidurai

17

Chanthurkanna.C

Enhanced protection of dynamic member ship information for group key distribution schemes

VII

IT1352

Cryptography and Network Security

Dinesh.V

Vinoth Kanna.S

18

Saranya jothi.C

Provably secure three party authenticated quantum key distribution protocols

VII

IT1352

Cryptography and Network Security

Niranjana.A

19

Packialakshmi.N

Secret and secure data communication using rc4 algorithm

VII

IT1352

Cryptography and Network Security

Nandhini.T

20

Sindhuja.K

IP Trace back using forensic server

VII

CS1401

InternetProgramming 

Shanmugapriya.M

21

Shymala gayathri.S

WASP(protecting web applications from SQL injection attacks)

VIII

IT1402

Mobile
Computing

Sharmila.V

Monisha.K

22

Kavitha.V

Performance of multihoming route control

V

CS1302

Computer Networks

Nithya.J

Pushpa kala devi.I

23

Jananee.R

Dual-resource TCP/AQM for processing constrained networks

V

CS1302

Computer Networks

24

Sivakumar.A.P

Simulation of active congestion control using network processor

V

CS1302

Computer Networks

25

Naveen balaje.B

Distributed mobility management for target tracking in mobile networks

VIII

IT1402

Mobile
Computing

26

Shahul hammed.M

Distriburted intrusion detection in wireless networks

VII

IT1352

Cryptography and Network Security

 


--
Hackerx Sasi
Don't ever give up.
Even when it seems impossible,
Something will always
pull you through.
The hardest times get even
worse when you lose hope.
As long as you believe you can do it, You can.

But When you give up,
You lose !
I DONT GIVE UP.....!!!


In three words I can sum up everything I've learned about life - it goes on......
with regards
prem sasi kumar arivukalanjiam

No comments:

Post a Comment

Slider

Image Slider By engineerportal.blogspot.in The slide is a linking image  Welcome to Engineer Portal... #htmlcaption

Tamil Short Film Laptaap

Tamil Short Film Laptaap
Laptapp

Labels

About Blogging (1) Advance Data Structure (2) ADVANCED COMPUTER ARCHITECTURE (4) Advanced Database (4) ADVANCED DATABASE TECHNOLOGY (4) ADVANCED JAVA PROGRAMMING (1) ADVANCED OPERATING SYSTEMS (3) ADVANCED OPERATING SYSTEMS LAB (2) Agriculture and Technology (1) Analag and Digital Communication (1) Android (1) Applet (1) ARTIFICIAL INTELLIGENCE (3) aspiration 2020 (3) assignment cse (12) AT (1) AT - key (1) Attacker World (6) Basic Electrical Engineering (1) C (1) C Aptitude (20) C Program (87) C# AND .NET FRAMEWORK (11) C++ (1) Calculator (1) Chemistry (1) Cloud Computing Lab (1) Compiler Design (8) Computer Graphics Lab (31) COMPUTER GRAPHICS LABORATORY (1) COMPUTER GRAPHICS Theory (1) COMPUTER NETWORKS (3) computer organisation and architecture (1) Course Plan (2) Cricket (1) cryptography and network security (3) CS 810 (2) cse syllabus (29) Cyberoam (1) Data Mining Techniques (5) Data structures (3) DATA WAREHOUSING AND DATA MINING (4) DATABASE MANAGEMENT SYSTEMS (8) DBMS Lab (11) Design and Analysis Algorithm CS 41 (1) Design and Management of Computer Networks (2) Development in Transportation (1) Digital Principles and System Design (1) Digital Signal Processing (15) DISCRETE MATHEMATICS (1) dos box (1) Download (1) ebooks (11) electronic circuits and electron devices (1) Embedded Software Development (4) Embedded systems lab (4) Embedded systems theory (1) Engineer Portal (1) ENGINEERING ECONOMICS AND FINANCIAL ACCOUNTING (5) ENGINEERING PHYSICS (1) english lab (7) Entertainment (1) Facebook (2) fact (31) FUNDAMENTALS OF COMPUTING AND PROGRAMMING (3) Gate (3) General (3) gitlab (1) Global warming (1) GRAPH THEORY (1) Grid Computing (11) hacking (4) HIGH SPEED NETWORKS (1) Horizon (1) III year (1) INFORMATION SECURITY (1) Installation (1) INTELLECTUAL PROPERTY RIGHTS (IPR) (1) Internal Test (13) internet programming lab (20) IPL (1) Java (38) java lab (1) Java Programs (28) jdbc (1) jsp (1) KNOWLEDGE MANAGEMENT (1) lab syllabus (4) MATHEMATICS (3) Mechanical Engineering (1) Microprocessor and Microcontroller (1) Microprocessor and Microcontroller lab (11) migration (1) Mini Projects (1) MOBILE AND PERVASIVE COMPUTING (15) MOBILE COMPUTING (1) Multicore Architecute (1) MULTICORE PROGRAMMING (2) Multiprocessor Programming (2) NANOTECHNOLOGY (1) NATURAL LANGUAGE PROCESSING (1) NETWORK PROGRAMMING AND MANAGEMENT (1) NETWORKPROGNMGMNT (1) networks lab (16) News (14) Nova (1) NUMERICAL METHODS (2) Object Oriented Programming (1) ooad lab (6) ooad theory (9) OPEN SOURCE LAB (22) openGL (10) Openstack (1) Operating System CS45 (2) operating systems lab (20) other (4) parallel computing (1) parallel processing (1) PARALLEL PROGRAMMING (1) Parallel Programming Paradigms (4) Perl (1) Placement (3) Placement - Interview Questions (64) PRINCIPLES OF COMMUNICATION (1) PROBABILITY AND QUEUING THEORY (3) PROGRAMMING PARADIGMS (1) Python (3) Question Bank (1) question of the day (8) Question Paper (13) Question Paper and Answer Key (3) Railway Airport and Harbor (1) REAL TIME SYSTEMS (1) RESOURCE MANAGEMENT TECHNIQUES (1) results (3) semester 4 (5) semester 5 (1) Semester 6 (5) SERVICE ORIENTED ARCHITECTURE (1) Skill Test (1) software (1) Software Engineering (4) SOFTWARE TESTING (1) Structural Analysis (1) syllabus (34) SYSTEM SOFTWARE (1) system software lab (2) SYSTEMS MODELING AND SIMULATION (1) Tansat (2) Tansat 2011 (1) Tansat 2013 (1) TCP/IP DESIGN AND IMPLEMENTATION (1) TECHNICAL ENGLISH (7) Technology and National Security (1) Theory of Computation (3) Thought for the Day (1) Timetable (4) tips (4) Topic Notes (7) tot (1) TOTAL QUALITY MANAGEMENT (4) tutorial (8) Ubuntu LTS 12.04 (1) Unit Wise Notes (1) University Question Paper (1) UNIX INTERNALS (1) UNIX Lab (21) USER INTERFACE DESIGN (3) VIDEO TUTORIALS (1) Virtual Instrumentation Lab (1) Visual Programming (2) Web Technology (11) WIRELESS NETWORKS (1)

LinkWithin