DETAILS OF PUBLICATIONS OF FACULTY
S.NO | NAME OF THE FACULTY | PAPERS PUBLISHED
| |||
Title of the paper | Name of the Journal/Conference with vol no, issue no, page no and impact factor.
| Date of publication/ presentation | DOI and Annexure details(refer Annexure details of Anna University, Chennai) | ||
1 | V Sujatha | Immensely discriminate routing in wireless networks | Indonesian Journal of Electrical Engineering and Computer Science, 2017, 8(3), pp. 712–714 | July 2017 | Google scholar |
2 | V Sujatha | Gender classification system based on wave ATOM transform | Indian Journal of Public Health Research and Development, 2017, 8(3), pp. 71–73 | August 2017 | Google scholar |
3 | V Sujatha | Fuzzy Based Scheme for Detection of Sybil Node in Wireless Sensor Networks | Journal of Advanced Research in Dynamical and Control Systems – | September 2017 | Scopus Indexed |
4 | R Sankar | Proficient and secured routing in MANET based on trust and energy supported AODV | Applied Mathematics and Information Sciences 2017, 11(3), pp. 807–817 | Nov 2017 | Google scholar
|
5
| Dr.S.Sridhar
| Fingerprint Enhancement using Gabor Filter Algorithm
| Engineering and Scientific International Journal
| June 2018
|
Google scholar
|
6 | Dr.S.Sridhar | Automatic Music Player based on Human Emotions using Face Recognition | Engineering and Scientific International Journal
| June 2018 | Google scholar |
7 | Dr.S.Sridhar | Automatic Path Finder and Controller of Robotic Arm using Multi-Neuron Heuristic Search Algorithm
| International Journal of Linguistics and Computational Applications
| June 2018 | Google scholar |
8 | Dr.S.Sridhar | Memory Management – An Efficient Key Value Storage with the usage of Dynamic Random Access Memory
| International Journal of Linguistics and Computational Applications
| June 2018 | Google scholar |
9 | Dr.S.Sridhar | Implementation of Smartphone Activated Door lock System Using Wireless Fidelity
| CiiT International Journal of Wireless Communication
| September 2018
| Google scholar |
10 | Dr.S.Sridhar | A Survey on Wireless communication from 1st Generation to 5th Generation
| CiiT International Journal of Wireless Communication
| September 2018
| Google scholar
|
11 | Mrs.V.Sujatha
| An efficient trust based method for Sybil node detection in mobile wireless sensor network | AIP Conference Proceedings | 26.09.2018 | Scopus Indexed
|
12 | Mrs.R.Anitha
| The vision of Autonomic Computing- Supervisory Control and Data Acquisition(SCADA) Security and Self-Managed by Systems in Distributed Environment | CiiT International Journal of Automation and Autonomous Systems | July 2018 | Google Scholar |
13 | Mrs.R.Anitha | Implementing Security in Virtual Personal Assistant by using Voice biometrics Technology | CiiT International Journal of Biometrics and Bioinformatics | July 2018 | Google Scholar
|
14 | Mrs.R.Anitha | Visible Light Communication Using Video Camera Based on Audio and Video Transmission | CiiT International Journal of Digital Image Processing | July 2018 | Google Scholar |
15 | Mr..R.Sankar
| Three Layer End-To-End Data Transaction Using Firewall | CiiT International Journal of Networking and Communication Engineering | July 2018 | Google Scholar |
16 | Mr..R.Sankar | Cardiac Monitoring Device for Patient Health Care Using Wireless Technology
| CiiT International Journal of Wireless Communication | September 2018
| Google Scholar |
17 | Mr..R.Sankar | To Identify the Fake Passport using image hiding by visual cryptography
| CiiT International Journal of Networking and Communication Engineering | September 2018
| Google Scholar |
18 | V Sujatha | E-carnet resumption and repository system for bus line commuter | Indonesian Journal of Electrical Engineering and Computer Science 2018, 9(2), pp. 262–264 | June 2018 | Google Scholar
|
19 | V Sujatha | An efficient trust based method for Sybil node detection in mobile wireless sensor network | AIP Conference Proceedings | October 2018 | Scopus Indexed |
20 | R Sankar | Trusted and optimized routing in mobile ad-hoc networks emphasizing quality of service | Applied Mathematics and Information Sciences 2018, 12(3), pp. 655–663 | Nov 2018 | Google Scholar
|
21 | Dr.S.Sridhar
| Survey of Game Base Learning for Education | CIIT International Journal of Software Engineering and Technology | Feb 2019 | Google Scholar
|
22 | Dr.S.Sridhar | Detecting the Speed of the Vehicles and Reduce Rash driving Using Wearable Sense | International Journal of Scientific & Engineering Research | April 2019 ISSN 2229-5518 | Google Scholar |
23 | Dr.S.Sridhar | A Survey on BigData Using Hadoop and MongoDB | International Journal of Scientific & Engineering Research | April 2019 ISSN 2229-5518 | Google Scholar |
24 | Dr.S.Sridhar | Prediction of Coronary Heart Disease using Algorithms in Data Mining | CIIT International Journal of Data mining and Knowledge Engineering | April 2019 Vol.11 No.4 | Google Scholar
|
25 | Mrs. V. Sujatha |
Identity Based Scheme against Sybil Attacks in Wireless Sensor Networks | International Journal of Engineering and Advanced Technology. | October 2019 |
ISSN:2249-8958.Scopus |
26 | Mrs. V. Sujatha | FEM – Hybrid Machine Learning Approach for the Detection of Sybil attacks in the Wireless Sensor Networks | International Journal of Innovative Technology and Exploring Engineering (IJITEE) | May 2019 ISSN: 2278-3075,. Scopus | Scopus Indexed |
27 | Mrs. V. Sujatha | Transforming Relational Database to Ontology Using Multiple Tables | CIIT Journal of Data mining and Knowledge Engineering | April 2019 Volume-8, Issue-7 | Google Scholar |
28 | Mrs.R Anitha | A Data locality based scheduler to enhance Map reduce performance in Heterogeneous environments | Future generated Computer Systems – Elsevier Journal | Jan 2019 | Elsevier Journal |
29 | Mrs.R Anitha | Software Review and Searching statements for Designing Process Reading by Requirements | International Journal of Research in Engineering Science and Management | April 2019 Vol. 2 Issue 4 | Google Scholar |
30 | Mrs.R Anitha | Disagreeing the Phishing attack, identifying the suspected phishing mails | International Journal of Research in Engineering Science and Management | April 2019 Vol. 2 Issue 4 | Google Scholar |
31 | Mrs.R Anitha | An Approach to Detect Sybil Attack in VANET by Neighbor Processing Algorithm | CIIT International Journal of Wireless communication | April 2019 Vol 11 No4 | Google Scholar |
32 |
Mr.R Sankar |
Smart Garbage Monitoring and Clearance System Using IOT in Society |
International Journal of Scientific & Engineering Research |
April 2019 ISSN 2229-5518 |
Google Scholar |
33 | Mr.R Sankar | Vehicle Detection Motion of System Features | International Journal of Research in Engineering Science and Management | April 2019 ISSN 2229-5518 | Google Scholar |
34 | Mr.R Sankar | Location and Tracking System Device (GPS) using Wireless Technology | International Journal of Research in Engineering Science and Management | April 2019 Vol. 2 Issue 4 | Google Scholar |
35 | Ms.S.Jayanthi
| Improving home automation security : integrating face recognition using LBPH Algorithm in Door lock system | CIIT International Journal of Artificial Intelligent systems and Machine learning | April 2019 Vol 11 No.4 | Google Scholar |
36 | Ms.S.Jayanthi
| Privacy protection and interruption avoidance for cloud based medical data | CIIT Journal of Data mining and Knowledge Engineering | April 2019 Vol.11 No.4 | Google Scholar |
37 | V Sujatha | FEM – Hybrid Machine Learning Approach for the Detection of Sybil attacks in the Wireless Sensor Networks | International Journal of Innovative Technology and Exploring Engineering | May 2019 | –Scopus Indexed |
38 | V Sujatha | Identity-based Scheme Against Sybil Attacks in Wireless Sensor Networks | Journal of Engineering and Advanced Technology | October 2019 | – Scopus Indexed |
39 | R Anitha | A data locality based scheduler to enhance MapReduce performance in heterogeneous environments
| Future Generation Computer System, 2019, 90, pp. 423–434 | Nov 2019 | Google Scholar
|
40 | R Anitha | Secure data storage using erasure-coding in green cloud environment | Journal of Green Engineering, 2020, 10(10), pp. 9533–9542 | Nov 2020 | Google Scholar |
41 | Dr P UmaEswar | Multilevel Security System for Big Data Cloud Using SDBS Algorithm” | International Journal of TEST Engineering & Management, ISSN: 0193-4120, Vol. 83, pp. 13363-13370, 2021.
| 2021 | Google Scholar |
42 | Mrs.R.Anitha | A process of creating a systematic Qos routing technique utilizing Manet | JUSST-journal of university of shanghai for science and technology. Volume-23, issue-05-2021. ISSN 1007-6735 | May 2021 | DOI:10.51201/JUSST/21/05194 |
43 | R Anitha | FEBSRA: Fuzzy Trust Based Energy Aware Balanced Secure Routing Algorithm for Secured Communications in WSNs | Feb 2022 | Google Scholar | |
44 | Mrs.V.Sujatha | Growth of E-Commerce and Security Issues | International E-Conference on Machine Learning and Cyber Security in Industry 4.0 MLCSI-21 | 20.10.2021 |
|
45 | Mrs.V.Sujatha | Misbehaviour node deduction using hamming residue mechanism in clustering WSN | Journal of Physics | 04-07-2022 |
|
46 | Mrs.V.Sujatha | Digital signature and public key cryptography for enhancing node authentication in WSN | Journal of Physics | 04-07-2022 |
|
47 | Mrs.N.Juliet | A Survey on Virtual Reality at Network and Cluster Analysis | International E-Conference on Machine Learning and Cyber Security in Industry 4.0 MLCSI-21 | 20.10.2021 |
|
48 | Mrs.N.Juliet | Automated detection of stomach cancer using dynamic CNN and Machine Learning Techniques | IJREAM | 04-07-2022 |
|
49 | Mrs.R.Anitha | Survey on Human-Computer Interaction Based DSS in Data Mining | International E-Conference on Machine Learning and Cyber Security in Industry 4.0 MLCSI-21 | 20.10.2021 |
|
50 | Mrs.R.Anitha | Prediction of the academic performance of slow learners using efficient machine learning algorithm | Advances in Computational Intelligence (2021) | 03.07.2021 |
|
51 | Mrs.R.Anitha | Automated detection of stomach cancer using dynamic CNN and Machine Learning Techniques | IJREAM | 04-07-2022 |
|
52 | Mr.R.Sankar | Enhancing Spatial Augmented Reality in Industry 4.0 | International E-Conference on Machine Learning and Cyber Security in Industry 4.0 MLCSI-21 | 20.10.2021 |
|
53 | Mrs.K.Malathy | Recognising Emotional Tone in Song Lyrics by Text Analytics using AI | International E-Conference on Machine Learning and Cyber Security in Industry 4.0 MLCSI-21 | 20.10.2021 |
|
54 | Mrs.K.Malathy | Automated detection of stomach cancer using dynamic CNN and Machine Learning Techniques | IJREAM | 04-07-2022 |
|
55 | Mrs.R. Rajeswari | Effect of Covid 19 on Electronic Industries | International E-Conference on Machine Learning and Cyber Security in Industry 4.0 MLCSI-21 | 20.10.2021 |
|
56 | Mrs.R. Rajeswari | Automated detection of stomach cancer using dynamic CNN and Machine Learning Techniques | IJREAM | 04-07-2022 |
|
PAPER PRESENTATION BY STAFF
(NATONAL AND INTERNATIONAL CONFERENCES)
S.NO | STAFF NAME | TITLE OF THE PAPER | NAME OF THE CONFERENCE | DATE OF PUBLICATION | ISSUE NUMBER |
1 | Mr. R. Sankar | Delayed Dynamics of Sir model in Wireless Sensor Networks | NCASHT-2019 | 11-7-2019 & 12-7-2019 | – |
2 | Mrs V.Sujatha | Identity Based Scheme against Sybil Attacks in Wireless Sensor Networks | NCASHT-2019 | October 2019 | ISSN:2249-8958.Scopus |
DETAILS OF PUBLICATIONS OF STUDENTS ACADEMIC YEAR 2017-2018
S.NO | NAME OF THE FACULTY | PAPERS PUBLISHED
| |||
Title of the paper | Name of the Journal/Conference with vol no, issue no, page no and impact factor.
| Date of publication/ presentation | DOI and Annexure details(refer Annexure details of Anna University, Chennai) | ||
1 | Ms.S.Jothilakshmi | Implementing a security in virtual Personal Assistant by using voice Biometrics Technology | CiiT International Journal of of Biometrics and Bioinformatics | July 2018 | Google Scholar
|
2 | Ms.P.Manjamadha | To Identify the Fake Passport using image hiding by visual cryptography | CiiT International Journal of Networking and Communication Engineering | July 2018 | Google Scholar
|
3 | Ms.R.Ramya Krishna
| Three Layer End-To-End Data Transaction Using Firewall
| CiiT International Journal of Networking and Communication Engineering
| July 2018
| Google Scholar
|
4 | Ms.R. Raskika | Cardiac Monitoring Device for Patient Health Care Using Wireless Technology | CiiT International Journal of Wireless Communication | September 2018 | Google Scholar
|
5 | Ms.D.Bhuvaneswari | The vision of Autonomic Computing- Supervisory Control and Data Acquisition(SCADA) Security and Self-Managed by Systems in Distributed Environment | CiiT International Journal of Automation and Autonomous Systems CiiT International Journal of Digital Image Processing | July 2018 | Google Scholar |
6 | Ms. E.Charlet Nancy
| Visible Light Communication Using Video Camera Based on Audio and Video Transmission
| Journal of Digital Image Processing
| September 2018
| Google Scholar |
7 | Ms.R.Sabitha | Implementation of Smartphone Activated Door lock System Using Wireless Fidelity | CiiT International Journal of Wireless Communication | September 2018 | Google Scholar |
8 | Ms. J Sowmiya | A Survey on Wireless communication from 1st Generation to 5th Generation | CiiT International Journal of Wireless Communication | September 2018 | Google Scholar |
9 | N. Ajith Kumar | Helping: Homeless Refugee and Protection of Women Through Mobile Application | Ciit international journal of networking and communication engineering |
| Google Scholar |
10 | Aswathi Chandran
| IoT in Smart Cities for Pollution Control and Traffic Management | 2nd National Seminar on the Dynamics of Data Analysis & Research Publications | 28/09/2018 | Google Scholar |
12 | A.Daniel | Server Side scripting with Node.js | 2nd National Seminar on the Dynamics of Data Analysis & Research Publications
| 28/09/2018 | Google Scholar |
13 | S.Dhivya | Big Data Analytics For Electric Vehicle Charging Station in Small Cities | 2nd National Seminar on the Dynamics of Data Analysis & Research Publications | 28/09/2018 | Google Scholar |
14 | P.Manoj | Safe & secure SMS based bank transaction using IMEI | 2nd National Seminar on the Dynamics of Data Analysis & Research Publications | 28/09/2018 | Google Scholar |
15 | M.Nandhini | Preventing theft of Network Packets in Packet Sniffer | 2nd National Seminar on the Dynamics of Data Analysis & Research Publications | 28/09/2018 | Google Scholar |
16 | R.Ramki
| Home Theft Identification Using Mobile Phone With GSM Technology | 2nd National Seminar on the Dynamics of Data Analysis & Research Publications | 28/09/2018 | Google Scholar |
17 | K.Rupavidhya & | Survey On The Comparison Of HDD And SSD To Uncover The Best Network Devices | 2nd National Seminar on the Dynamics of Data Analysis & Research Publications | 28/09/2018 | Google Scholar |
18 | M.Shanmuga Priya | 3D Secure Autentication Using Java | 2nd National Seminar on the Dynamics of Data Analysis & Research | 28/09/2018 | Google Scholar |
19 | R.Sharmila
| Prevention of crime in internet world | 2nd National Seminar on the Dynamics of Data Analysis & Research Publications | 28/09/2018 | Google Scholar |
20 | B.Sonia | Implementation Of Voice Recognition Technology In Hospitals Using Dragon Naturallyspeaking Software | CIIT JOURNALS | 5-07-2018 | Google Scholar |
21 |
S.Sowndarya | Working Of Spoofing and Protection Against IP Spoofing Attack On Network | 2nd National Seminar on the Dynamics of Data Analysis & Research Publications | 28/09/2018 | Google Scholar |
22 | P.Sowndharya
| VLAN Management Network Design And Implementation. | 2nd National Seminar on the Dynamics of Data Analysis & Research Publications | 28/09/2018 | Google Scholar |
23 |
V.Sugasini
| The impact of electronic waste to ensure green computing | 2nd National Seminar on the Dynamics of Data Analysis & Research Publications | 28/09/2018 | Google Scholar |
24 | S.Yuvaraj | A Survey on Wireless Communication from a Generation to 5th Generation. | CIIT International Journals of Wireless Communication |
| Google Scholar |
25 | V.Nivedha | An Improved Solution to Detect Credit Card Fraud Using Apache Hadoop in Big Data Environment | CiiT International Journal of Data Mining Knowledge Engineering | 07-07-2018 | Google Scholar |
26 | T.Parthiban | Search Engine Optimization With Google Search Console | 2nd National Seminar on the Dynamics of Data Analysis & Research Publications | 28/09/2018 | Google Scholar |
27 | D.Pratheep raja | Data Hiding into images with Encryption using Steganography | CiiT International Journal of Data Mining Knowledge Engineering | 07/07/2018 | Google Scholar |
28 | R.Ramya Krishna | Three Layer End to End Secured Data Transaction Using Firewall | CIIT International Journal | 13/07/2018 | Google Scholar |
29 | R.Sharmila | Prevention of crime in internet world | 2nd National Seminar on the Dynamics of Data Analysis & Research Publications | 28/09/2018 | Google Scholar |
30 | R.Sujitha | Whip Environment And Antitoxin Health Care Using IOT | 2nd National Seminar on the Dynamics of Data Analysis & Research Publications | 28/09/2018 | Google Scholar |
31 | M.Susithra | An Approach Of Securing Phishing Attacks Using Anti-phishing Techniques | 2nd National Seminar on the Dynamics of Data Analysis & Research Publications | 28/09/20S18 | Google Scholar |
DETAILS OF PUBLICATIONS OF STUDENTS ACADEMIC YEAR 2019-2020
S.NO | NAME OF THE STUDENT |
PAPERS PUBLISHED
| |||
Title of the paper | Name of the Journal/ Conference with vol no, issue no, page no and impact factor.
| Date of publication/ presentation | DOI / Annexure details(refer Annexure details of Anna University, Chennai) | ||
1 | S. Shalini | An Big Data Analytics and moderations of healthcare: Applications, Impacts, Challenges, Opportunities | CiiT International Journal of Biometrics and Bioinformatics | July-September 2019 |
ISSN 0974-9675 |
2 | S. Charumathi | Analytical Methods for Developing Security Big Data Issue: Facebook Security | CiiT International Journal of Programmable Device Circuits and Systems | May 2019 |
ISSN 0974-973X |
3 | S. Divya | IOT-Enabled Smart City Services and Security | CiiT International Journal of AI Systems and Machine Learning | June 2019 | ISSN 0974-9667 |
4 | M. Hema | Smart Home Automation with Advanced Monitoring and Controlling System using Iris Recognition System | CiiT International Journal of Programmable Device Circuits and Systems | May 2019 | ISSN 0974-973X |
5 | Ms.J.Swetha | Survey of Game Base Learning for Education | CIIT International Journal of Software Engineering and Technology | Feb 2019 | Google Scholar |
6 | Mr V.Venugopal | Detecting the Speed of the Vehicles and Reduce Rash driving Using Wearable Sense | International Journal of Scientific & Engineering Research | April 2019 | Google Scholar |
7 | Mr.K.Suresh | A Survey on BigData Using Hadoop and MongoDB | International Journal of Scientific & Engineering Research | April 2019 | Google Scholar |
8 | Ms.D.Aishwarya | Software Review and Searching statements for Designing Process Reading by Requirements | International Journal of Research in Engineering Science and Management | April 2019 | Google Scholar |
9 | Mrs.M.Kavitha | Disagreeing the Phishing attack, identifying the suspected phishing mails | International Journal of Research in Engineering Science and Management | April 2019 | Google Scholar |
10 | Mr.S.Raghul | Smart Garbage Monitoring and Clearance System Using IOT in Society | International Journal of Scientific & Engineering Research | April 2019 | Google Scholar |
11 | Mr.B.Navaneetha Krishnan | Vehicle Detection Motion of System Features | International Journal of Scientific & Engineering Research | April 2019 | Google Scholar |
12 | Mrs.M.Malini | Location and Tracking System Device (GPS) using Wireless Technology | International Journal of Research in Engineering Science and Management | April 2019 | Google Scholar |
13 | Mr.R.S.Revanth | Creating a Personal Cloud Storage Using NAS | CIIT International Journal of Software Engineering and Technology | Feb 2019 | Google Scholar |
14 | Ms.R.Priyanka | Transforming Relational Database to Ontology Using Multiple Tables | CIIT Journal of Data mining and Knowledge Engineering | April 2019 | Google Scholar |
15 | Ms.B.Kiruthika | Improving home automation security : integrating face recognition using LBPH Algorithm in Door lock system | CIIT International Journal of Artificial Intelligent systems and Machine learning | April 2019 | Google Scholar |
16 | Ms.K.Nandhini | Privacy protection and interruption avoidance for cloud based medical data sharing | CIIT International Journal of Data mining and Knowledge Engineering | April 2019 | Google Scholar |
17 | V Aarthi | An Approach to Detect Sybil Attack in VANET by Neighbor Processing Algorithm | CIIT International Journal of Wireless communication | April 2019 | Google Scholar |
18 | S.Devi | Prediction of Coronary Heart Disease using Algorithms in Data Mining
| CIIT International Journal of Data mining and Knowledge Engineering | April 2019 | Google Scholar |
DETAILS OF PUBLICATIONS OF STUDENTS ACADEMIC YEAR 2021-2022
S.NO | NAME OF THE STUDENT | PAPERS PUBLISHED
| |||
Title of the paper | Name of the Journal/ Conference with vol no, issue no, page no and impact factor. | Date of publication/ presentation | DOI / Annexure details(refer Annexure details of Anna University, Chennai) | ||
1 | Raghavan P | Growth of E-Commerce and Security Issues | International E-Conference on Machine Learning and Cyber Security in Industry 4.0 MLCSI-21 | 20.10.2021 | – |
2 | S. Padma Priya | A Survey on Virtual Reality at Network and Cluster Analysis | International E-Conference on Machine Learning and Cyber Security in Industry 4.0 MLCSI-21 | 20.10.2021 | – |
3 | Pavithra M | Survey on Human-Computer Interaction Based DSS in Data Mining | International E-Conference on Machine Learning and Cyber Security in Industry 4.0 MLCSI-21 | 20.10.2021 | –
|
4 | RamaDevi R | Survey on Human-Computer Interaction Based DSS in Data Mining | International E-Conference on Machine Learning and Cyber Security in Industry 4.0 MLCSI-21 | 20.10.2021 | – |
5 | Dinesh Kumar B | Enhancing Spatial Augmented Reality in Industry 4.0 | International E-Conference on Machine Learning and Cyber Security in Industry 4.0 MLCSI-21 | 20.10.2021 | – |
6 | M. Sairaraffi | Recognising Emotional Tone in Song Lyrics by Text Analytics using AI | International E-Conference on Machine Learning and Cyber Security in Industry 4.0 MLCSI-21 | 20.10.2021 | – |
7 | G. MukeshKumar | Effect of Covid 19 on Electronic Industries | International E-Conference on Machine Learning and Cyber Security in Industry 4.0 MLCSI-21 | 20.10.2021 | – |
LIST OF INNOVATIVE PROJECTS FOR INNOVATIONS
S.No. | Title of Innovative Project | Student Team Members | Year & Branch | Project Guide |
1 | EMERGING SAFE AND SECURITY MANAGEMENT SYSTEM | KEERTHNA .U | III & MCA | MRS.R.ANITHA |
2 | KUMAR’S PHARMACY & CLINICAL MANAGEMsENT SYSTEM | SUJITHA R |
III & MCA | MRS.R.ANITHA |
3. | OM SAKTHI PHARMACEUTICAL APPLICATION | NANDHINI.K | III & MCA | MRS.R.ANITHA |
4. | T.E.L.C ADAIKALANATHAR CHURCHAND FELLOWSHIP MANAGEMENT SYSTEM | C.SHINICA RAJA SUNDARI | III & MCA | DR.S.SRIDHAR |
DETAILS OF BEST PROJECT WORK
SL. / BATCH NO | TITLE OF THE PROJECT | NAME OF THE STUDENT AND REGISTER NUMBER | NAME OF THE GUIDE | INDUSTRY/INHOUSE |
JUSTIFICATION |
1. | SwiftERP | BADRINARAYANAN T 111918621306 | Mrs.R.Anitha | PORTMYTECH, Ambattur | Helpful to the company to calculate the pay bills. |
2. | Web Crawler For Site Security Fault Link Prediction | SATHISH KUMAR G 111918621343 | Mr.R.Sankar | bcube corp, Chennai | Explain about various process of web crawling to secure the web sites. |
3. | Five Minutes Farmers | SIVAMANI N 111918621347 | Mrs.V.Sujatha | AURO Hosting,Kilpauk | Helpful for farmers to sell their product directly without any mediator. |
4. | Characterizing the propagation of situational information in social media during COVID-19 epidemic | PAVITHRA A 111918621335 | Mr.R.Sankar | San software soultions,Kodambakkam | In current pandemic situation this project helped the people to analyze about covid -19 |