BATCH (2007-11)
Name of the student | Project Title | Related to subject | |||
SEM | Sub code | Sub name | |||
1 | R.Packiyalakshmi | Diffusion tensors for sheared and rotated rectangles | V | CS1302 | Computer networks |
2 | S.Sudharani | Secret sharing using authenticated group key transfer protocol | VII | IT1352 | Cryptography and network security |
K.Sona | |||||
T.Kavitha | |||||
3 | P.Saranya | Half tone visual cryptography | VII | CS1014 | Information security |
4 | S.Gayatri | Secure arithmetic code | VII | IT1352 | Cryptography and network security |
P.Kaviya | |||||
5 | K.Vasanthi | Retrieval of source images degraded through unknown blur operators | VIII | EC1009 | Digital image processing |
S.Parveen banu | |||||
M.Sathya | |||||
6 | S. Janani | Robust background initialization of a heavily cluttered and poor lighted video | VIII | EC1009 | Digital image processing |
R.Vigneshwari | |||||
7 | A.Sunitha | Rate distortion efficient piecewise planar 3-D scene representation | VIII | EC1009 | Digital image processing |
R.Tamil Elakkiya | |||||
J.Jasmine | |||||
8 | S.Sujitha | Non-invasive biometric authentication for mobile banking | VII | IT1352 | Cryptography and network security |
D.Poorna Meenakshi | |||||
R.Premi Keerthiga | |||||
9 | R.V.Rameela | Packet pacing in small buffered optical packet switched network | V | CS1302 | Computer networks |
B.Brindha | |||||
C.Srinivethini | |||||
10 | B.Kowsalya | Enhancing file distribution performance through peer to peer networks | V | CS1302 | Computer networks |
M.Sharmila Devi | |||||
S.Fathima Shuruma | |||||
11 | P.NavaneethaKrishnan | Flexible rollback recovery in dynamic heterogeneous grid computing | V | CS1302 | Computer networks |
J.Balachandar | |||||
G.Vigneshraja | |||||
12 | D.Kumaran | DDOS – Resilient Scheduling to Counter application Layer Attacjs under Imperfect detection | V | CS1302 | Computer networks |
S.S.Karthikkumar | |||||
S.Jeyakumar | |||||
13 | A.Arun Paarthi | General game player | VI | CS1354 | Graphics and multimedia |
V.Jegan | |||||
P.Hari hara sudhan | |||||
14 | P.Rajkumar | Enhancing the flexibility and extra information of manufacturing system using RFID | VIII | IT1402 | Mobile Computing |
A.Deepan | |||||
R.Karthik | |||||
15 | R.Mayandi | Color extended visual cryptography | VII | CS1014 | Information security |
P.Ramamoorthi | |||||
K.Pandiarajan | |||||
16 | V.B.Bharath | Recognition of affective states of humans | VIII | EC1009 | Digital image processing |
S.Vijaykumar | |||||
17 | S.Aswin Karthik | Wearable and mobile system to manage remotely heart failure | VIII | IT1402 | Mobile Computing |
M.Dhanabal | |||||
S.Arun | |||||
18 | I.Bibul Shivaram | Fault resistive parallel computing | VIII | CS1017 | ParallelComputing |
G.Senthilraj | |||||
R.Sithik | |||||
19 | J.S.Richard Jim Reeves | Real time Speech to text conversion | VII | CS1351 | Artificial Intelligence |
M.Sathiya Sankar | |||||
S.P.Gokul |
BATCH (2006-2010)
Name of the student | Project Title | Related to subject | |||
1 | R.Monisha
| Encryption Based on Visual Cryptography and D-H Key agreement scheme | SEM | Sub code | Sub name |
V.Lalitha
| VII | IT1352 | Cryptography and Network Security | ||
P.Lingeshwari | |||||
2 | R.Varshini | Authentication of Intended users by Graphical CAPTCHAs | VII | IT1352 | Cryptography and Network Security |
S.Kannika Parameswari | |||||
M.Punithavathi | |||||
3 | K.Lakshmi Priya | Personal Authentication Using Finger Knuckle Surface | VII | IT1352 | Cryptography and Network Security |
V.Nithya | |||||
4 | K.Pandiselvi | Mobility and routing messages in partitioned network using context information | V | CS1302 | Computer Networks |
S.Muthumari | |||||
G.Radha | |||||
5 | G.Dhavamalar Vinola | Detecting Malicious Packet losses using Compromised Router Detection Protocol | V | CS1302 | Computer Networks |
P.Tharini | |||||
6 | M.P.Shanmugapriya | Fault prediction using conceptual Cohesion of classes in Object Oriented systems | VII | CS1402 | Object Oriented Analysis and Design |
P.V.Eswari Priya | |||||
C.Kiruthika | |||||
7 | R.Jegatheeswari | Flawless Rejuvenation of watermarked Image using DE Algorithm | VIII | EC1009 | Digital Image Processing
|
Y.Vetri Selvi | |||||
E.Tamil Nila | |||||
8 | V.Asis Marceline | On color Texture normalization for active appearance model | VIII | EC1009 | Digital Image Processing
|
B.Rajeswari | |||||
V.Priadarsini | |||||
9 | R.Anuja | Authentication of Individuals using Palm Dorsal vein pattern and Knuckle Shape | VIII | EC1009 | Digital Image Processing
|
A.Gayathri | |||||
B.Durga Devi | |||||
10 | R.J.Babitha | Secured communication in computationally constrained Environment | VII | IT1352 | Cryptography and Network Security |
R.Guna Chitra | |||||
A.Hendry Roselin Mary | |||||
11 | S.V.Naveenkannan | Color Image Segmentation for Apple Grading | VII | EC1009 | Digital Image Processing
|
S.Jeyaganesh | |||||
A.Subamanikandan | |||||
12 | M.B.Vignesh Kumar | Enhancing Search Performance in unstructured P2P networks based on users' common interest | V | CS1302 | Computer Networks |
P.AnnamalaiKarthikeyan | |||||
P.Rajesh Kumar | |||||
13 | P.Deepan | Content Based Image Retrieval using Color Histogram | VIII | EC1009 | Digital Image Processing
|
D.Guruprasath | |||||
S.K.Arun | |||||
14 | D.Philip | Monitoring the Application layer DDOS attacks for popular websites | VII | IT1352 | Cryptography and Network Security
|
P.Ponperumal | |||||
K.Elangovan | |||||
15 | J.Vasantha Rajan | A Trusted System for Confidential Asset Transportation and Vehicle Monitoring using GPS, GPRS, RFID and Imaging Devices | VIII | IT1402 | Mobile Computing |
P.Rajesh Kumar | |||||
P.Selvam | |||||
16 | S.Arunraj | Extracting information from Radiology Reports using text mining | VI | CS1004 | Data Warehousing and Mining |
S.Subramani | |||||
D.Vadivel | |||||
17 | J.Avinash | An efficient Search strategy based on user category | VII | CS1401 | Internet Programming |
T.Shiva | |||||
G.Samkumar | |||||
18 | K.Krishnan | A novel approach to steganography based authentication | VII | IT1352 | Cryptography and Network Security |
P.Saravana Kumar | |||||
M.Dinesh Kannan | |||||
19 | N.Vignesh Ram | Incremental learning of chunk data for online pattern classification systems | VI | CS1004 | Datawarehousingand Mining |
A.Stalin Pusharaj | |||||
C.Karuppusamy | |||||
20 | S.Vignesh | Active Learning Methods for Interactive Image Retrieval | VIII | EC1009 | Digital Image Processing
|
D.Deepan | |||||
21 | S.Swadeesh | Computerization of Co-operative Banks | V | CS1301 | Database Management Systems |
S.Prasanna Raja | |||||
J.Eugene Sam Jacob | |||||
22 | J.Malarvizhi | A Method to detect blood vessel structure and exudates associated with diabetic retinopathy | VIII | EC1009 | Digital Image Processing
|
A.Surya |
BATCH ( 2005-2009)
Name of the student | Project Title | Related to subject | |||
1 | Kannan.M | Automated periodicity detection in digital images | SEM | Sub code | Sub name |
Muthu Kumar's | VIII | EC1009 | Digital Image Processing
| ||
Ram Kumar.R.R | |||||
2 | Raja sankar.R | Fractal image compression using region-based approach | VIII | EC1009 | Digital Image Processing
|
Pradeepkumar.P | |||||
Adrian David.H | |||||
3 | Vinoth.S | A self-organising visual surveillance system | VIII | EC1009 | Digital Image Processing
|
Babu.S | |||||
Sathya Moorthi.P | |||||
4 | Saranya Devi.R | Face recognition using eigen face approach | VIII | EC1009 | Digital Image Processing
|
Ramya.U | |||||
Shanmugapriya.G | |||||
5 | Kannika Parameswari.J | Text to speech recognition | VII | CS1351 | Artificial Intelligence |
Ramya.K | |||||
Surya.E | |||||
6 | Madhu Malar Devi.A | A novel secret data sharing scheme based on block truncation coding | VII | IT1352 | Cryptography and Network Security |
Saranya Devi.J | |||||
Kavitha.J.R | |||||
7 | Priyadharshini.T.B | Stepping up the rotation of high-resolution images | VIII | EC1009 | Digital Image Processing
|
Anitha Devi.T | |||||
Chitradevi.S | |||||
8 | Shanmugam.M | Illuminant color estimation using edge based color constancy technique | VIII | EC1009 | Digital Image Processing
|
Manikandaprabhu.T | |||||
Vignesh.M | |||||
9 | Amuthan.M | Hybrid region filing using in painting techniques | VIII | EC1009 | Digital Image Processing
|
Manikandamoorthy.M | |||||
Karthikeyan.R | |||||
10 | Kavya.A | Face detection based on skin color using neural networks | VIII | EC1009 | Digital Image Processing
|
Jothi.A | |||||
11 | Sathiya Rama Prabha.M.P | A copyright protection using digital watermarking | VIII | EC1009 | Digital Image Processing
|
Suganya Ananthi.M | |||||
Sathiya.R | |||||
12 | Mathivaanan.R | Anti-phasing approach for safe browsing | VII | CS1401 | InternetProgramming |
Manojkumar.K.R | |||||
Karthicksankar. S | |||||
13 | Suganya. G | A fuzzy based relevance feedback CBIR algorithm | VIII | EC1009 | Digital Image Processing
|
Vasantha Devi.S | |||||
Madhura.J | |||||
14 | Deepan Raj.T | Enhanced file transfer protocol | V | CS1302 | Computer Networks |
Clement Lloyd | |||||
15 | Dhilipan Rajha.R.A | Controlling IP spoofing through interdomain packet filters | V | CS1302 | Computer Networks |
Shanmuga Pradeepan.R | |||||
16 | Arvindh.G.V | Interactive adaptation for mobile clients using existing APIs | VIII | IT1402 | Mobile |
Suresh Kumar.S | |||||
Pandidurai | |||||
17 | Chanthurkanna.C | Enhanced protection of dynamic member ship information for group key distribution schemes | VII | IT1352 | Cryptography and Network Security |
Dinesh.V | |||||
Vinoth Kanna.S | |||||
18 | Saranya jothi.C | Provably secure three party authenticated quantum key distribution protocols | VII | IT1352 | Cryptography and Network Security |
Niranjana.A | |||||
19 | Packialakshmi.N | Secret and secure data communication using rc4 algorithm | VII | IT1352 | Cryptography and Network Security |
Nandhini.T | |||||
20 | Sindhuja.K | IP Trace back using forensic server | VII | CS1401 | InternetProgramming |
Shanmugapriya.M | |||||
21 | Shymala gayathri.S | WASP(protecting web applications from SQL injection attacks) | VIII | IT1402 | Mobile |
Sharmila.V | |||||
Monisha.K | |||||
22 | Kavitha.V | Performance of multihoming route control | V | CS1302 | Computer Networks |
Nithya.J | |||||
Pushpa kala devi.I | |||||
23 | Jananee.R | Dual-resource TCP/AQM for processing constrained networks | V | CS1302 | Computer Networks |
24 | Sivakumar.A.P | Simulation of active congestion control using network processor | V | CS1302 | Computer Networks |
25 | Naveen balaje.B | Distributed mobility management for target tracking in mobile networks | VIII | IT1402 | Mobile |
26 | Shahul hammed.M | Distriburted intrusion detection in wireless networks | VII | IT1352 | Cryptography and Network Security |
No comments:
Post a Comment