Wednesday, September 5, 2012

Project name and student who under took the project for our reference please go through it

BATCH  (2007-11)

S.NO

Name of the student

Project Title

Related to subject

SEM

Sub code

Sub name

1

R.Packiyalakshmi

Diffusion tensors for sheared and rotated rectangles

V

CS1302

Computer networks

2

S.Sudharani

Secret sharing using authenticated group key transfer protocol

VII

IT1352

Cryptography and network security

K.Sona

T.Kavitha

3

P.Saranya

Half tone visual cryptography

VII

CS1014

Information security

4

S.Gayatri

Secure arithmetic code

VII

IT1352

Cryptography and network security

P.Kaviya

5

K.Vasanthi

Retrieval of source images degraded through unknown blur operators

VIII

EC1009

Digital image processing

S.Parveen banu

M.Sathya

6

S. Janani

Robust background initialization of a heavily cluttered and poor lighted video

VIII

EC1009

Digital image processing

R.Vigneshwari

7

A.Sunitha

Rate distortion efficient piecewise planar 3-D scene representation

VIII

EC1009

Digital image processing

R.Tamil Elakkiya

J.Jasmine

8

S.Sujitha

Non-invasive biometric authentication for mobile banking

VII

IT1352

Cryptography and network security

D.Poorna Meenakshi

R.Premi Keerthiga

9

R.V.Rameela

Packet pacing in small buffered optical packet switched network

V

CS1302

Computer networks

B.Brindha

C.Srinivethini

10

B.Kowsalya

Enhancing file distribution performance through peer to peer networks

V

CS1302

Computer networks

M.Sharmila Devi

S.Fathima Shuruma

11

P.NavaneethaKrishnan

Flexible rollback recovery in dynamic heterogeneous grid computing

V

CS1302

Computer networks

J.Balachandar

G.Vigneshraja

12

D.Kumaran

DDOS – Resilient Scheduling to Counter application Layer Attacjs under Imperfect detection

V

CS1302

Computer networks

S.S.Karthikkumar

S.Jeyakumar

13

A.Arun Paarthi

General game player

VI

CS1354

Graphics and multimedia

V.Jegan

P.Hari hara sudhan

14

P.Rajkumar

Enhancing the flexibility and extra information of manufacturing system using RFID

VIII

IT1402

Mobile Computing

A.Deepan

R.Karthik

15

R.Mayandi

Color extended visual cryptography

VII

CS1014

Information security

P.Ramamoorthi

K.Pandiarajan

16

V.B.Bharath

Recognition of affective states of humans

VIII

EC1009

Digital image processing

S.Vijaykumar

17

S.Aswin Karthik

Wearable and mobile system to  manage remotely heart failure

VIII

IT1402

Mobile Computing

M.Dhanabal

S.Arun

18

I.Bibul Shivaram

Fault resistive parallel computing

VIII

CS1017

ParallelComputing

G.Senthilraj

R.Sithik

19

J.S.Richard Jim Reeves

Real time Speech to text conversion

VII

CS1351

Artificial Intelligence

M.Sathiya Sankar

S.P.Gokul

 

BATCH  (2006-2010)

S.NO

Name of the student

Project Title

Related to subject

1

R.Monisha

 

Encryption Based on Visual Cryptography and D-H Key agreement scheme

SEM

Sub code

Sub name

V.Lalitha

 

VII

IT1352

Cryptography and Network Security

P.Lingeshwari

2

R.Varshini

Authentication of Intended users by Graphical CAPTCHAs

VII

IT1352

Cryptography and Network Security

S.Kannika Parameswari

M.Punithavathi

3

K.Lakshmi Priya

Personal Authentication Using Finger Knuckle Surface

VII

IT1352

Cryptography and Network Security

V.Nithya

4

K.Pandiselvi

Mobility and routing messages in partitioned network using context information

V

CS1302

Computer Networks

S.Muthumari

G.Radha

5

G.Dhavamalar Vinola

Detecting Malicious Packet losses using Compromised Router Detection Protocol

V

CS1302

Computer Networks

P.Tharini

6

M.P.Shanmugapriya

Fault prediction using conceptual Cohesion of classes in Object Oriented systems

VII

CS1402

Object Oriented Analysis and Design

P.V.Eswari Priya

C.Kiruthika

7

R.Jegatheeswari

Flawless Rejuvenation of watermarked Image using DE Algorithm

VIII

EC1009

Digital Image Processing

 

Y.Vetri Selvi

E.Tamil Nila

8

V.Asis Marceline

On color Texture normalization for active appearance model

VIII

EC1009

Digital Image Processing

 

B.Rajeswari

V.Priadarsini

9

R.Anuja

Authentication of Individuals using Palm Dorsal vein pattern and Knuckle Shape

VIII

EC1009

Digital Image Processing

 

A.Gayathri

B.Durga Devi

10

R.J.Babitha

Secured communication in computationally constrained Environment

VII

IT1352

Cryptography and Network Security

R.Guna Chitra

A.Hendry Roselin Mary

11

S.V.Naveenkannan

Color Image Segmentation for Apple Grading

VII

EC1009

Digital Image Processing

 

S.Jeyaganesh

A.Subamanikandan

12

M.B.Vignesh Kumar

Enhancing Search Performance in unstructured P2P networks based on users' common interest

V

CS1302

Computer Networks

P.AnnamalaiKarthikeyan

P.Rajesh Kumar

13

P.Deepan

Content Based Image Retrieval using Color Histogram

VIII

EC1009

Digital Image Processing

 

D.Guruprasath

S.K.Arun

14

D.Philip

Monitoring the Application layer DDOS attacks for popular websites

VII

IT1352

Cryptography and Network Security

 

 

 

P.Ponperumal

K.Elangovan

15

J.Vasantha Rajan

A Trusted System for Confidential Asset Transportation and Vehicle Monitoring using GPS, GPRS, RFID and Imaging Devices

VIII

IT1402

Mobile Computing                                                                                                                             

P.Rajesh Kumar

P.Selvam

16

S.Arunraj

Extracting information from Radiology Reports using text mining

VI

CS1004

Data Warehousing and Mining

S.Subramani

D.Vadivel

17

J.Avinash

An efficient Search strategy based on user category

VII

CS1401

Internet Programming

T.Shiva

G.Samkumar

18

K.Krishnan

A novel approach to steganography based authentication

VII

IT1352

Cryptography and Network Security

P.Saravana Kumar

M.Dinesh Kannan

19

N.Vignesh Ram

Incremental learning of chunk data for online pattern classification systems

VI

CS1004

Datawarehousing

and Mining

A.Stalin Pusharaj

C.Karuppusamy

20

S.Vignesh

Active Learning Methods for Interactive Image Retrieval

VIII

EC1009

Digital Image Processing

 

D.Deepan

21

S.Swadeesh

Computerization of Co-operative Banks

V

CS1301

Database Management Systems

S.Prasanna Raja

J.Eugene Sam Jacob

22

J.Malarvizhi

A Method to detect blood vessel structure and exudates associated with diabetic retinopathy

VIII

EC1009

Digital Image Processing

 

A.Surya

 

 

 

BATCH ( 2005-2009)

S.NO

Name of the student

Project Title

Related to subject

1

Kannan.M

Automated periodicity detection in digital images

SEM

Sub code

Sub name

Muthu Kumar's

VIII

EC1009

Digital Image Processing

 

Ram Kumar.R.R

2

Raja sankar.R

Fractal image compression using region-based approach

VIII

EC1009

Digital Image Processing

 

Pradeepkumar.P

Adrian David.H

3

Vinoth.S

A self-organising visual surveillance system

VIII

EC1009

Digital Image Processing

 

Babu.S

Sathya Moorthi.P

4

Saranya Devi.R

Face recognition using eigen face approach

VIII

EC1009

Digital Image Processing

 

Ramya.U

Shanmugapriya.G

5

Kannika Parameswari.J

Text to speech recognition

VII

CS1351

Artificial Intelligence

Ramya.K

Surya.E

6

Madhu Malar Devi.A

A novel secret data sharing scheme based on block truncation coding

VII

IT1352

Cryptography and Network Security

Saranya Devi.J

Kavitha.J.R

7

Priyadharshini.T.B

Stepping up the rotation of high-resolution images

VIII

EC1009

Digital Image Processing

 

Anitha Devi.T

Chitradevi.S

8

Shanmugam.M

Illuminant color estimation using edge based color constancy technique

VIII

EC1009

Digital Image Processing

 

Manikandaprabhu.T

Vignesh.M

9

Amuthan.M

Hybrid region filing using         in painting techniques

VIII

EC1009

Digital Image Processing

 

Manikandamoorthy.M

Karthikeyan.R

10

Kavya.A

Face detection based on skin color using neural networks

VIII

EC1009

Digital Image Processing

 

Jothi.A

11

Sathiya Rama Prabha.M.P

A copyright protection using digital watermarking

VIII

EC1009

Digital Image Processing

 

Suganya Ananthi.M

Sathiya.R

12

Mathivaanan.R

Anti-phasing approach for safe browsing

VII

CS1401

InternetProgramming 

Manojkumar.K.R

Karthicksankar. S

13

Suganya. G

A fuzzy based relevance feedback CBIR algorithm

VIII

EC1009

Digital Image Processing

 

Vasantha Devi.S

Madhura.J

14

Deepan Raj.T

Enhanced file transfer protocol

V

CS1302

Computer Networks

Clement Lloyd

15

Dhilipan Rajha.R.A

Controlling IP spoofing through interdomain packet filters

V

CS1302

Computer Networks

Shanmuga Pradeepan.R

16

Arvindh.G.V

Interactive adaptation for mobile clients using existing APIs

VIII

IT1402

Mobile
Computing

Suresh Kumar.S

Pandidurai

17

Chanthurkanna.C

Enhanced protection of dynamic member ship information for group key distribution schemes

VII

IT1352

Cryptography and Network Security

Dinesh.V

Vinoth Kanna.S

18

Saranya jothi.C

Provably secure three party authenticated quantum key distribution protocols

VII

IT1352

Cryptography and Network Security

Niranjana.A

19

Packialakshmi.N

Secret and secure data communication using rc4 algorithm

VII

IT1352

Cryptography and Network Security

Nandhini.T

20

Sindhuja.K

IP Trace back using forensic server

VII

CS1401

InternetProgramming 

Shanmugapriya.M

21

Shymala gayathri.S

WASP(protecting web applications from SQL injection attacks)

VIII

IT1402

Mobile
Computing

Sharmila.V

Monisha.K

22

Kavitha.V

Performance of multihoming route control

V

CS1302

Computer Networks

Nithya.J

Pushpa kala devi.I

23

Jananee.R

Dual-resource TCP/AQM for processing constrained networks

V

CS1302

Computer Networks

24

Sivakumar.A.P

Simulation of active congestion control using network processor

V

CS1302

Computer Networks

25

Naveen balaje.B

Distributed mobility management for target tracking in mobile networks

VIII

IT1402

Mobile
Computing

26

Shahul hammed.M

Distriburted intrusion detection in wireless networks

VII

IT1352

Cryptography and Network Security

 


--
Hackerx Sasi
Don't ever give up.
Even when it seems impossible,
Something will always
pull you through.
The hardest times get even
worse when you lose hope.
As long as you believe you can do it, You can.

But When you give up,
You lose !
I DONT GIVE UP.....!!!


In three words I can sum up everything I've learned about life - it goes on......
with regards
prem sasi kumar arivukalanjiam

No comments:

Post a Comment