The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by , 2018-02-27 03:19:36

coperbyte2k18_souveniur

coperbyte2k18_souveniur

Powered by TCPDF (www.tcpdf.org)

Powered by TCPDF (www.tcpdf.org)



ABOUT US
J.K.K.Munirajah College of Technology strives at the holistic formation of world class

leaders with ultimate professional competence and a strong ethical perspective. J.K.K.Munirajah
College of Technology endeavors to contribute to the world, men and women empowered with
professional excellence with a spirit of innovation and entrepreneurship. Our premier
professional institute is known for its academic excellence and value-based education. State-of-
the-art infrastructure facilities at the J.K.K.Munirajah College of Technology are conducive for
learning and development.

VISION
J.K.K.Munirajah College of Technology endeavors to impart effective technical

expertise and promotes top-notch education with holistic training, molding students into creative
and innovative professionals.

MISSION

J.K.K.Munirajah College of Technology is committed to produce qualified professionals
with exceptional caliber to excel in the sphere of engineering they belong to.

1

SALIENT FEATURES:
 Located in a serene and conducive natural environment.
 Extensive experience of the Chairman promotes diverse engineering disciplines.
 Committed and technically well-qualified faculty members.
 Scientifically designed academic program to impart holistic education.
 Contemporary infrastructure with modern amenities.
 Wi-Fi campus with unlimited access to the Internet.
 Laboratories and Workshops equipped with ergonomically designed furniture and fitted
with best instruments and equipments.
 Digital Library coupled with exhaustive collection of books and journals.
 State-of-art Digital Communication Lab to facilitate excellent Communication Skills.
 Four Computer Centers with Centralized IBM Server, 2Tb External storage device,
separate servers for the firewall.
 Strong industry interface for practical training and research.
 Placement Oriented Training from the first year onwards.
 Clubs for Music, Fine Arts, Sports and Literature
 Separate hostel facilities for boys and girls with modern Cafeteria facility.
 Auditorium and seminar halls with high resolution projectors.
 Soft Skill and Value added courses to enhance the confidence of students to compete in
the global market.
 Intercollegiate competitions, quiz, seminars and Symposia.

2

INFRASTRUCTURE

 J.K.K. Munirajah College of Technology, T.N.Palayam is a destination for holistic
learning situated on a serene; pollution free location away from the
 pandemonium of the city. The college fosters an interactive learning
environment providing the students with infinite opportunities to evolve
as successful professionals.

 J.K.K.Munirajah institutions are approved by AICTE, New Delhi, affiliated to Anna
University, Chennai.

 The following under graduate and post graduate courses are offered.

COURSES OFFERED

U.G. Courses
 Computer Science and Engineering
 Information Technology
 Mechanical Engineering
 Electronics and Communication Engineering
 Electrical and Electronics Engineering
 Civil Engineering
 Auto Mobile Engineering

P.G. Courses

 Master of Computer Applications
 Master of Business Administration
 ME - Computer Science & Engineering
 ME - Applied Electronics
 ME - Power Electronics & Drives
 ME - CAD/CAM
 ME - Manufacturing Engineering

3

CHAIRMAN’S MESSAGE

DR.J.K.K.MUNIRAJAH, M.TECH (BOLTON)

The Chairman and Managing Trustee of Annai J.K.K.Sampoorani Ammal Charitable
Trust Dr.J.K.K.Munirajahh, M.Tech. (Bolton) is a renowned leading industrialist of
Komarapalayam town, Namakkal District, blessed with a vision towards holistic, empowering
education. This Charitable Trust under the guidance of our founder Dr.J.K.K.Munirajahh
renders dedicated services to the society through Paramedical Institutions offering Diploma,
Graduate and Post Graduate Courses in Pharmacy, Nursing, Physiotherapy and Occupational
Therapy at Komarapalayam, Namakkal District and a Polytechnic, Community Polytechnic and
an Industrial Training Centre at T.N.Palayam, Erode District. Besides, the Trust also runs
Matriculation School, Higher Secondary School for Physically Challenged, Blind, Deaf and
Dumb and a Rehabilitation Center for handicapped at Komarapalayam. These educational
institutions train the young men and women to be socially conscious and responsible
professionals.

4

SECRETARY’S MESSAGE

MRS.KASTHURIPRIYA KRUPAKARMURALI, MBA

In today’s competitive world, students need exposure to the state of the art technologies
in the world. To become an entrepreneur, one must be well informed about the various
opportunities in the field.

I feel national level symposium is one such opportunity that will bring together a group
of eminent scientists, research scholars, faculty members and students from our country to
present ideas and share their understandings.

I strongly believe this symposium will benefit our students to take part in the inter and
intra college events and develop their soft skills. I hope this symposium will serve the purpose of
shaping young and energetic minds and channelize their thought process towards successful
nation building.

5

PRINCIPAL’S MESSAGE

Dr.K.SRIDHARAN M.E,MBA,Phd,MISTE

We at J.K.K. Munirajah College of Technology strive to train our students to excel in
their profession as well as embrace spirituality which helps in raising the individual to a higher
level of awareness, understanding, and kinship with all living things. A conducive and
encouraging environment empowers our students to acquire the required knowledge and
technical expertise in their field. We systematize the situations, conditions, task materials, and
opportunities by which our students acquire new or different ways of thinking, feeling, and
doing. The talents of the students are identified to disseminate knowledge and inculcate
futuristic technical education to our future engineers and entrepreneurs to serve our nation and
the universe. Professional education with an optional synthesis of ethical education to meet the
occupational needs of the society is the forte of J.K.K. Munirajah College of Technology. We
gladly welcome the future of India to join hands with us to surge towards a prosperous career
through interactive teaching and learning process.

6

HOD’S MESSAGE

N.SATHYABALAJI M.E., MISTE,(PhD)

I always encourage my students to learn the subjects with practical knowledge. We train
them to face the hurdles and obstacles in their real life Situations and to overcome them and
emerge as a winner .we the faculty members of CSE and IT are well experienced and dedicated
to promote knowledge to our students. We take care of their interests in academic as well as non
academic activities and try to bring out the best from our students.

We encourage team work, smart work and make the students remain optimistic in their
approach. A good academician can benefit the society and his family with his skills so we are
ready to build enthusiastic engineers who can boom the IT industry and create a revolution
among the engineers.

We motivate the students to take part in other extracurricular activities and bring name
and fame to our institution. We don’t create employees just we create entrepreneurs who will
provide opportunities for the nation.

7

CHIEF GUEST’S PROFILE

Dr.G.KOMARASAMY

I am Dr G Komarasamy working as an Assistant Professor (Senior Grade) in the
Department of Computer Science and Engineering at Bannari Amman Institute of Technology,
Sathyamangalam since June 2005. I have completed my B.E in 2003, M.E in 2005 and finished
my Ph.D in 2014 in the area of Data Mining.

My total teaching experience is 12 years and 3 months in the field of Computer Science
and Engineering. I have got guideship from Anna University, Chennai to guide Ph.D
candidates. I have also guided many students’ projects of both UG and PG
programme.Presently, I have been guiding 5-research scholars under Anna University,
Chennai. I have completed 2- consultancy projects for my college. (Dr Application and
Mobile APP &Portal for Handicapped Persons) total cost of Rs. 3,50,000/-

I have organized 42 events like seminar, workshop, conference, FDP and Video
Conferencing. I have received an award from India Book of Records for organizing a workshop
on “Mobile Application Development” for 1000+ students to create many Android Applications
within 12 Hours.

I have attended 35 events like seminar, workshop, conference, FDP and Video
Conferencing. I have signed MoU with OneYes Technologies and I served as an Editorial
board member for many journals. I am in the members of IAENG and ISTE.

8

I have published 17 Journals, presented 10 papers in International Conferences and 15
papers in National Conferences.

I have received many research grants from various funding agencies like DRDO, CSIR,
ICMR, DST and AICTE for organizing social relevant projects.

Academic responsibilities are
APPs development club In-charge, NBA co-ordinator, NIRF In-charge, Short Term
Course In-charge,Academic Audit committee member, Lab In-charge, College Web Page
Update In-charge, Time Table In-charge, Placement Coordinator, ISO Internal Auditor, Class
advisor, Infosys Campus Connect programme In-charge and member in Board of Studies,
Disciplinary committee and Question Paper Analysis Committee.

9

CHIEF GUEST’S PROFILE

Mr.U.MUTHAIAH M.E., (PhD)
Mr.Muthaiah U received his B.Tech Degree in Information Technology from Mepco

Schlenk Engg. College, Sivaksi. He holds M.E Degree in Computer communication from Anna
University, Trichy and pursuing part time Ph.D in Anna University, Chennai. He has more than
12 years of Teaching Experience and took up various assignments like Head of Department, IIT
Remote Center coordinator, ISO certification, Industry Relationships officer for the placement
and JCI-Sri Shanmugha Chapter -President. Presently working as a Associate Professor,
HOD/CSE and Placement Officer in Sri Shanmugha College of Engineering and Technology,
Sankari, Salem. He has received many awards for journal publications, 100% results in subjects
and published papers in 9 reputed journals. He has attended many workshops, Seminars, FDP’s
and Conferences. He has published two books such as “Problem solving and python
programming” and “Object Oriented Programming and Data Structures”. He is the Life time
member of ISTE & Computer Society of India (CSI).

10

ABOUT THE DEPARTMENT

J.K.K. Munirajah college of Technology has introduced the 4 year courses like B.E
(Computer Science & Engineering) & B.Tech(Information Technology) in the year of 2008.
The courses are approved by AICTE, New Delhi and affiliated to ANNA University, Chennai.
The department houses well - furnished software labs with sufficient power backup and
computing facilities. The department has 8 Mbps leased line internet access. It refers to
Management and use of Information using computer based tools. The term includes both
hardware & software. The department has been offering excellent infra structural facilities
with variety of computing platforms to transform the students into Innovative, component and
high quality IT professionals to meet the growing global changes. The department has modern
aids such as scanner, Inkjet printer, dot matrix printer, LCT, OHP & Internet with Wi-Fi
facilities for the benefit of the students.

FACULTY MEMBERS

NAME DESIGNATION QUALIFICATION

Mr.SATHYABALAJI.N HOD M.E. MISTE, (PhD)
Mr.MANOOJ KUMAR S. B AP/CSE M.E, (PhD)
Mr.KARTHIKEYAN G AP/CSE M.E, MISTE, (PhD)
Mr.DHARANITHARAN S AP/CSE M.E.,MISTE
Ms.SUBHA.V AP/CSE M.E.,
Mrs.NITHYA.P AP/CSE M.E.,
Mrs.JANARANJANI.T AP/CSE M.E.,
Mr.LOGESWARAN.A AP/IT M.E.,MISTE
Ms.PRATHIPA.K AP/IT M.E.,
Mr.SENTHILKUMAR.M AP/MCA MCA
Mrs.PRIYA.S AP/MCA MCA
Ms.SELVAPRIYA.M AP/CSE M.E.,
Mr.SAKTHIVEL.N LAB TECHNICIAN DIPLOMA
Mrs.SIVAPRIYA.A LAB TECHNICIAN B.A

11

FACULTY MEMBERS

Mr.SATHYABALAJI.N Mr.MANOOJKUMAR.S.B Mr.KARTHIKEYAN.G Mr.DHARANITHARAN.S

Mr.LOGESWARAN.A Mr.SENTHILKUMAR.M Mrs.NITHYA.P Ms.SUBHA.V

Ms.PRATHIPA.K Ms.JANARANJANI.T Mrs.SELVAPRIYA.M Mrs.PRIYA.S

Mr.SAKTHIVEL.N Mrs.SIVAPRIYA.A

12

CSE – IV YEAR (2014-2018)

AMAL DEV K.R AMRUTHA LAKSHMI HARITHA RAFI KALESH K.K LOGESHWARI.V

MANIMAGALA.S MEENATCHI.S MONISHA.J NIVITHRA.R PRIYA.PC

RANJITHA.C SANDHIYA.G SREE LAKSHMI VANMATHI.M KASTHURI.V

PAWAN KUMAR RAMACHANDRAN.G
MAHATO

13

IT – IV YEAR (2014-2018)

BANUMATHI.R PRITHIVRAJ.V RADHIKA.V SEVVANTHI.D SIJO IGNATIOUS

SONA S KONDOOR CHARLY.S SURENDERD

IT - III YEAR (2014-2018)

DON M.TIGY

14

CSE – III YEAR (2015-2019)

ANANDA.B ANITHA.R BAGYALAKSHMI.N BHARATHI.J CHANDRAKALA.M

DHANALAKSHMI.S DIVYA.B JANARTHANAN.P JEEVA K JOTHY.M

JYOTHY.P KRISHNAVENI.Y LALITHA.R MAHESHWARI.C MALINI.G

MANU.S MEENA.K NANDHA KUMAR.I NITHYA.P NIVETHA.M

15

PRABHAGARAN.S PRAKASH.C PRIYANGA.K RAGUPATHIRAJ.C SAGUNTHALA.R

SANTHIYA.R SANTHIYA.R SARANYA.P SHIVA KUMAR.J VIJAYAKANTH.R

SOWMYA.P SUDHAKARAN.S TAMILSELVI.S SIVARAJU.M YOGESH KUMAR

BANUMATHI.A JOEN YAXEN

16

CSE – II YEAR (2016-2020)

CHINRASU.P DEVAYANI.Y DEVI BHARATHI.T DHANALAKSHMI.G DIVYA.L

GAYATHRI.J HEMALATHA.M KALEESWARAN.E KAMALAM.V KESAVAN.P

KOKILA.B LOGESWARAN.N PREETHA.K PUTTULAKSHMI.N RAGUPATHI.R

SANTHIYA.P SHANTHISRI.K

17

IT – II YEAR (2016-2020)

ARUNKUMAR.R BOOPATHIRAJ.M INDIRAN.R SALINI.M SASIKUMAR.V

18

MCA – III YEAR (2016-2018)

ARULPATHI.K KARTHIKEYAN.P MANIKANDAN.I SIDDARAJU.P.M SREEJA N

VIJAY.N ELAYARAJA.M

MCA – II YEAR (2017-2019)

INDHUMATHI.M JENNIFEER MEGO RADHA.M RAKKINI.P SALOMEENA.R

MANOJ.S

19



Powered by TCPDF (www.tcpdf.org)

COMMITTEE MEMBERS
CONVENOR
Mr.N.SATHYABALAJI M.E.,MISTE,PhD.,

ORGANIZING COMMITTEE TREASURERS:
STAFF MEMBERS: Kalesh KK (IV CSE)
Mr.S.Dharanitharan M.E., MISTE., Pawan Kumar Mahato (IV CSE)
Mr.G.Karthikeyan M.E., PhD., Nithya.P (III CSE)
Mr.M.Senthil Kumar MCA., Malini.G (III CSE)
Mr.A.Logeswaran M.E., MISTE., ShanthiSri.K (II CSE)
Indhiran.R (II IT)
STUDENT MEMBERS:
OVERALL COORDINATORS: MOC:
Ramachandran.G (IV CSE) STAFF MEMBERS:
Sijo Ignatious (IV IT) Ms.V.Subha M.E.,
STUDENT MEMBERS:
SECRETARY: Haritha Rafi (IV CSE)
Prithivraj.V (IV IT) Meenatchi.S (IV CSE)
Yogesh Kumar (III CSE)
JOINT SECRETARY:
Meenatchi.S (IV CSE)
Tamil selvi.S (III CSE)
Yogesh kumar (III CSE)

20

RECEPTION,CERTIFICATE& AUDIO, MIC &SOUNDS
REGISTRATION STAFF MEMBERS:
STAFF MEMBERS: Mr.G.Karthikeyan M.E., PhD.,
Ms.K.Prathipa M.E., STUDENT MEMBERS:
Ms.T.Janaranjani M.E., Kalesh KK (IV IT)
Ms.M.Selvapriya M.E.,
Mrs.P.Nithya M.E., DECORATIONS
STUDENT MEMBERS: STAFF MEMBERS:
Amrutha Lakshmi (IV CSE) Mr.S.Dharanitharan M.E., MISTE.,
Sree Lakshmi (IV CSE) STUDENT MEMBERS:
BagyaLakshmi.N (III CSE) Amal Dev KR (IV CSE)
Chandrakala.M (III CSE) Shiva raju.M (III CSE)

FOOD EDITOR’S DESK:
STAFF MEMBERS: STAFF MEMBERS:
Mr.M.Senthil Kumar MCA., Mr.A.Logeswaran M.E., MISTE.,
Mr.A.Logeswaran M.E., MISTE., Mr.S.Dharanitharan M.E., MISTE.,
STUDENT MEMBERS: STUDENT MEMBERS:
Charly.S (IV IT) Meenatchi.S (IV CSE)
Surender.D (IV IT) Banumathi.R (IV IT)
Vanmathi.M (IV CSE)
DISCIPLINE
STAFF MEMBERS: 21
Mrs.S.Priya MCA.,
Ms.M.Selvapriya M.E.,
STUDENT MEMBERS:
Sijo Ignatious (IV IT)
Prithvi Raj.V (IV IT)

EVENTS COMMITTEE

PAPER PRESENTATION TECHNICAL QUIZ
STAFF COORDINATORS: STAFF COORDINATOR:
Mrs.P.Nithya M.E., Ms.K.Prathipa M.E.,
Mrs.S.Priya MCA.,
STUDENT MEMBERS:
STUDENT MEMBERS: Amrutha Lakshmi (IV CSE)
Haritha Rafi (IV CSE) Sree Lakshmi (IV CSE)
Logeshwari.V (IV CSE) Manimegala.S (IV CSE)
Nithya.P (III CSE) Amal Dev KR (IV CSE)
Santhiya.R (III CSE) Siddharaju PM (IV CSE)
Bharathi.J (III CSE) Indhumathi.M (IV CSE)
Anitha.R (III CSE) Malini.G (IV CSE)
Krishnaveni.Y (III CSE) Maheshwari.C (IV CSE)
Jeeva.K (III CSE) Prabhagaran.S (IV CSE)
Indhiran.R (II IT) Sudhakaran.S (IV CSE)
BoopathiRaj.M (II IT) Banumathi.A (III CSE)
Chinrasu.P (II CSE) Jyothy.P (IV CSE)
Ragupathi.R (II CSE) Logeswaran.N (IV CSE)
Arulpathi.K (III MCA) Kaleeswaran.E (IV CSE)
Manikandan.I (III MCA) Devayani.Y (IV CSE)

22

GOOGLE HUNT SURPRISE EVENTS
STAFF COORDINATOR: STAFF COORDINATORS:
Mr.A.Logeswaran M.E., MISTE., Mr.G.Karthikeyan M.E., PhD.,
Mr.S.Dharanitharan M.E., MISTE.,
STUDENT MEMBERS: STUDENT MEMBERS:
Kasthuri.V (IV CSE) Meenatchi.S (IV CSE)
Ranjitha.C (IV CSE) Radhika.V (IV IT)
Sandhiya.G (IV CSE) Vanmathi.M (IV CSE)
Sevvanthi.D (IV IT) Rakkini.P (II MCA)
Jennifeer Mego (II MCA) Sivaraju.M (III CSE)
Karthikeyan.P (III MCA) Vijayakanth.R (III CSE)
Saranya.P (III CSE) Shivakumar.M (III CSE)
Nivetha.M (III CSE) Manu.S (III CSE)
Dhivya.B (III CSE) Ananda.B (III CSE)
Tamil Selvi.S (III CSE) Don M Tigy (III IT)
Jyothi.M (III CSE) Nandhakumar (III CSE)
Sandhiya.R (III CSE) DeviBharathi.T (II CSE)
Keshavan.P (II CSE) Dhanalakshmi.G (II CSE)
Arun Kumar.R (II IT) Gayathri.J (II CSE)
Sasi kumar.V (II IT) Dhivya.L (II CSE)
Elayaraja.M (III MCA)

23

CODE DEBUGGING DUBSMASH
STAFF COORDINATORS: STAFF COORDINATOR:
Ms.V.Subha M.E., Ms.T.Janaranjani M.E.,
Mr.M.Senthilkumar MCA.,
STUDENT MEMBERS:
STUDENT MEMBERS: Banumathi.R (IV IT)
Monisha.J (IV CSE) Sona S Kondoor (IV IT)
Priya.P.C (IV CSE) Charly.S (IV IT)
Nivithra.R (IV CSE) Surender.D (IV IT)
Salomeena.R (II MCA) Radha.M (II MCA)
Manoj.S (II MCA) BagyaLakshmi.N (III CSE)
Yogesh kumar (III CSE) Chandrakala.M (III CSE)
Lalitha.R (III CSE) DhanaLakshmi.S (III CSE)
Sakunthala.R (III CSE) Ragupathiraj.C (III CSE)
Sowmiya.P (III CSE) Prakash.C (III CSE)
Vijay.N (III MCA) Janarthanan.P (III CSE)
Shalini.M (II IT) Preetha.K (II CSE)
Hemalatha.M (II CSE) PuttuLakshmi.N (II CSE)
Kokila.B (II CSE) Santhiya.P (II CSE)
Kamalam.V (II CSE) ShanthiSri.K (II CSE)
Sreeja.N (III MCA)

24

BIG DATA
AUTHORS: A.ABHIRAMI, V. KALAVANI
GANANAMANI COLLEGE OF TECHNOLOGY

ABSTRACT
Big data Edition is data sets that are so voluminous and complex that traditional data processing
application software is inadequate to deal with them. Big data challenges include capturing data, data
storage, data analysis, search, sharing, transfer, visualization, querying, and updating and information
privacy. There are five dimensions to big data known as Volume, Variety, Velocity and the recently added
Veracity and Value .Lately, the term quotes big data & quotes ; tends to refer to the use of predictive
analytics, user behavior analytics, or certain other advanced data analytics methods that extract value from
data, and seldom to a particular size of data set. & quotes; There is little doubt that the quantities of data
available are indeed large, but that’s not the most relevant characteristic of this new data ecosystem &
quotes; Analysis of data sets can find new correlations to &quotes; spot business trends, prevent diseases,
combat crime and so on & quotes; Scientists, business executives, practitioners of medicine ,advertising and
governments alike regularly meet difficulties with large data-sets in areas including Internet search, in tech,
urban informatics, and business informatics. Scientists encounter limitations in e-Science work, including
meteorology, genomics, economics, complex physics simulations, biology and environment.

5G WIRELESS TECHNOLOGY
AUTHOR: RAGAVI.R

EXCEL ENGINEERING COLLEGE, KOMARAPALAYAM
ABSTRACT

As the fifth generation of wireless technology, known as 5G is expected to create the “networks of
networks which will deliver higher bandwidth and lower latency than ever before –MOBILE NETWORK
OPERATORS (MNO).Improved and innovative data coding and modulation techniques, which includes
filter bank multi carrier way in schemes. In 5G, researches are related to the development of World Wide
Web (WWW), Dynamic ADHOC Wireless Networks (DAWN) and Real Wireless Communications. The
most important technologies for 5G technologies are 802.11 wireless local area networks (WLAN) and
802.16 Wireless Metropolitan Area Networks (WMAN), Ad-hoc Wireless Personal Area Networks
(WPAN) and wireless networks for digital communication.4G Technology will include several standards
under a common umbrella, similar to 3G but with IEEE 802.XX wireless mobile network integrated from
the commencement. The 5G technologies include all types of advanced features which makes 5G
technology most dominant technology in near future. With the vision of network technology continuing to
evolve, Comm Scope’s experience and focus on progress can help you unlock the power band potential of
5G.

LI-FI TECHNOLOGY
AUTHORS: R.RADHAPRIYA, M.SANGEETHA
DHIRAJLAL COLLEGE OF TECHNOLOGY

ABSTRACT
LI-FI concept which will be something similar to the concept of WI-FI LI-FI(Light Fidelity)
it means that sending data to LED light bulb that varies intensity is faster than Human eye. The
main demand for wireless spectrum is the data congestion can occur to avoid these type of congestion
using LI-FI technology. LI-FI provides better capacity, availability, security, efficiency. It is very fast &
cheapest wireless communication system. Wi-Fi is great for general wireless coverage within buildings,

25

whereas LI-FI is ideal for high density wireless data coverage in confined area and for relieving
radio interference issues. Haas envisions a future where data for laptops, smart phones, and tablets will
be transmitted through the light in a room. The major difference of LI-FI from WI-FI is the data
transfer speed is high. LI-FI doesn't need any License because it is free band & it has point to
point network topology.

GRID COMPUTING
AUTHORS: RAMYASRI G.KAVIYAMANI MADHUMITA

KAMADHENU COLLEGE OF ARTS AND SCIENCE
ABSTRACT

The Grid has the potential to fundamentally change the way science and engineering are
done. Aggregate power of computing resources connected by networks—of the Grid— exceeds that of any
single supercomputer by many orders of magnitude. At the same time, our ability to carry out computations
of the scale and level of detail required, for example, to study the Universe, or simulate a rocket engine, are
severely constrained by available computing power. Hence, such applications should be one of the main
driving forces behind the development of Grid computing. Grid computing is emerging as a new
environment for solving difficult problems. Linear and nonlinear optimization problems can be
computationally expensive. The resource access and management is one of the most important key factors
for grid computing. It requires a mechanism with automatically making decisions ability to support
computing tasks collaborating and scheduling. Grid computing is an active research area which promises to
provide a flexible infrastructure for complex, dynamic and distributed resource sharing and sophisticated
problem solving environments. The Grid is not only a low level infrastructure for supporting computation,
but can also facilitate and enable information and knowledge sharing at the higher semantic levels, to
support knowledge integration and dissemination. The main driving forces behind the development of Grid
computing. Grid computing is emerging as a new environment for solving difficult problems. Linear and
nonlinear optimization problems can be computationally expensive. The resource access and management is
one of the most important key factors for grid computing.

HUMANOID ROBOTICS
PAVITHRA.K NANDHINI
DHIRAJLAL GANDHI COLLEGE OF TECHNOLOGY

ABSTRACT
Humanoid is being implemented in Robotics and these robots are called as “HUMANOID ROBOTS
“.A humanoid robot is a robot which has a similar shape as that of a human body. In general, a humanoid
robot has a torso, a head, two arms, and two legs. Some humanoids may also have a face, eyes, mouth and
are categorized as male humanoids and female humanoids. it is developed by French company robotics
which was released in 2014.humanoid robotics is an emerging and challenging research field, which has
received significant attention during the past decade, researchers are striving to increase the function
capacities so that these humanoids can be used in various fields apart from heavy industries . Microsoft co-
founder and world's richest man bill gates recently mentioned that the companies which replace employees
with robots should pay extra taxes so that government can invest this amount for unemployed.

26

ETHICAL VALUES OF CYBER SECURITY
AUTHOR: SOUMIYA N

KSR COLLEGE OF ENGINEERING
ABSTRACT

With the exponential growth of computers inhabiting the earth with many millions of miles of optical
fiber, wire and air waves, link people, their computers and the vast array of information handling devices
together, we can say that we are living in cyber era.. Our society is truly an information society, our time an
information age. The question arises is whether the kind of society being created is the one we want. As we
know that each and everything in the world has its own pros and cons, so has the Cyber system. At the one
end cyber system provides incomparable opportunities to communicate and learn and at the other end some
individuals or community exploit its power for criminal purposes. This exploitation can be minimized by
implementing some ethical values and practices to those individuals or community, which in turn can be
called cyber ethics.

SIXTH SENSE TECHNOLOGY
AUTHOR: BAVISHNA.B

SRI-SHANMUGHA COLLEGE OF ENGINEERING
ABSTRACT

A Sixth Sense device which works of the principles of gesture recognition and image processing to
capture, zoom (in and out), toggle pictures and control mouse pointer with ease just by the help of colored
caps worn on the fingertips of the user. Sixth Sense can also obey hand gestures. The camera recognizes
objects around a person instantly and performs various gesture related applications depend upon the
scenario. Also can access or manipulate the information using fingers. Sixth sense, or subtle perception
ability, is our ability to perceive the subtle-dimension or the unseen world. It also includes our ability to
understand the subtle cause and effect relationship behind many events, which is beyond the understanding
of the intellect. Extrasensory perception (ESP), clairvoyance, premonition, intuition are synonymous with
sixth sense or subtle perception ability.

SIXTH SENSE TECHNOLOGY
RAMYA.D KOWSALYA.P

MAHENDRA ENGINEERING COLLEGE FOR WOMEN
ABSTRACT

Sixth sense technology is a mini projector coupled with a camera and a cell phone which acts as the
computer and connected to the cloud, all the information storage on the web. Sixth sense can also obey hand
gestures. Also can access or manipulate the information using fingers. The device has huge number of
application. Mapping can also be done anywhere with the features of zooming in or zooming out. The
camera tracks your fingers the camera tracks the movement of the coloured markers using movement
Algorithms. The projects stored data onto most any surface, Needed for internet connection and surface
needed for internet connection and computing power. The device can also tell arrival. Departure or delay
time of airplane tickets.

FRACTAL ROBOTS
AUTHOR: G.SUSHRUT

ABSTRACT

Fractal robots are shape shifting robots designed using cubic bricks. The cubic bricks are fitted with a
motor. They can be commanded to perform different functions and can be used in variety of fields.

27

RED TACTON
AUTHORS: M.LAKHMI, T.AKHILA
MAHENDRA ENGINEERING COLLEGE FOR WOMEN

ABSTRACT
Big data Edition is data sets that are so voluminous and complex that traditional data processing

application software inadequate to deal with them. Big data challenges include capturing data, data storage,

data analysis, search, sharing, transfer, visualization, querying, and updating and information privacy. There

are five dimensions to big data known as Volume, Variety, Velocity and the recently added Veracity and

Value. Lately, the term &quotes; big data & quotes; tends to refer to the use of predictive analytics, user

behavior analytics, or certain other advanced data analytics methods that extract value from data, and

seldom to a particular size of data set. &quotes; There is little doubt that the quantities of data now available
are indeed large, but that’s not the most relevant characteristic of this new data ecosystem & quotes;

Analysis of data sets can find new correlations to & quotes; spot business trends, prevent Scientists,

business executives, practitioners of medicine, advertising and governments alike regularly meet difficulties

with large data-sets in areas including Internet search, in tech, urban informatics, and business informatics.

Scientists encounter limitations in e-Science work, including meteorology, genomics; connect atomic

complex physics simulations, biology and environmental research.

SECURITY ISSUES ON WAP IN MOBILE COMPUTING
AUTHORS: KAUSHALYA SELVI. M

MAHENDRA COLLEGE OF ENGINEERING
ABSTRACT

Boundaries Mobility is about individual and on-demand connection. It's about getting the right
information at the right time and in the right place. In the end, mobility has the power to transform the way
we go beyond the Internet. Delivering mobility isn't just about wireless devices and networks. It's really
about connecting people - connecting them with one another, with their work, their homes and their play -
and supporting their experience regardless of which technology is used. So that the end result is a seamless
customer experience with all the old removed.

SMART GABAGE COLLECTION USING GSM MODULE WITH ARDUINO UNO
AUTHORS: M.SATHYA MUTHAIAH

SRI-SHANMUGHA COLLEGE OF ENGINEERING AND TECHNOLOGY
ABSTRACT

Waste management is one of the primary problem that the world faces irrespective of the case of
developed or developing country. The key issue in the waste management is that the garbage bin at
public places gets overflowed well in advance before the commencement of the next cleaning process.
To avoid all such hazardous scenario and maintain public cleanliness and health this work is mounted
on a smart garbage system. The main theme of the work is to develop a smart intelligent garbage alert
system for a proper garbage management .This paper proposes a smart alert system for garbage
clearance by giving an alert signal to the nearby truck for instant cleaning of dustbin with proper
verification based on level of garbage filling. This process is aided by the ultrasonic sensor which is

28

interfaced with UNO to check the level of garbage filled in the dustbin and sends the alert to the nearby
truck by tracking the location once if garbage is filled. If any problem occurred in the nearby truck, it
will send the alert message to other nearby truck by using GSM. After cleaning the dustbin, the driver
confirms the task of emptying the garbage. The whole process is upheld by an embedded module
integrated with GSM and IOT Facilitation. This is to perform the remote monitoring of the cleaning
process, done by the workers, thereby reducing the manual process of monitoring and verification. The
notifications are sent by using Wi-Fi module.

NETWORK CAPACITY BASED GEOGRAPHICAL QOS ROUTING FOR MULTIMEDIA QOS ROUTING
FOR MULTIMEDIA STREAM OVER MANET
AUTHORS: M.THENMOZHI S.KIRUTHIKA

SRISHANMUGHA COLLEGE OF ENGINEERING &TECHNOLOGY
ABSTRACT

The Mobile ADHOC Network (MANET) support in anywhere and anytime wireless
communication expands the multimedia applications’ scope. Ever demanding task of multimedia
applications to determine the quality of routers among huge number of portable devices is to improve
Quality of Service. To support real time multimedia streams, several geographical based Quality of
Service routing protocols have been proposed; however, the portable devices’ expansion leads to
stringent Quality of Service demands in MANET. The main reason behind the Quality of Service
demand is the dynamic network capacity which relies on network size, node mobility, density, node
energy, and communication range. The existing protocols are inefficient to the delay sensitive
multimedia applications over MANET due to the lack of attention on dynamic network capacity. This
work presents a new Network Capacity based Geographical routing(NCG) along with several routing
schemes such as Radio Range Regulation. is routing ,called NCG++. The NCG++ routing estimates the
network capacity in terms of Quality of Service, facilitating minimum energy for every node to provide
the Quality of Service for varying network size, node mobility, and node density. Finally, this work
simulates and compares the proposed NCG++ routing protocols performance with the existing Quality
of Service-GPSR. Thus, the performance evaluation illustrates that the NCG++ routing protocol
outperforms the existing protocols.

T-TRACKING ALGORITHM DATA TRACKING IN WIRELESS SENSOR NETWORK
AUTHORS: R.GAYATHRI KRITHIKA

SRI-SHANMUGHA COLLEGE OF ENGINEERING AND TECHNOLOGY
ABSTRACT

In Wireless Sensor Network the sensor nodes are being dispersed spatially, so the target tracking
has became a key factor. In the existing system they have used the Face Tracking for tracking the
target. They have developed non-overlapping region called Face. In that they have used Brink
Detection algorithm for selecting the edges and Optimal Selection algorithm for selecting sensor node
in each face. However, if the selected node fails then tracking accuracy will be lost. In this paper we
have a new tracking scheme, called t-Tracking is designed to overcome the target tracking problem in
WSNs considering multiple objectives: low capturing time, high quality of tracking. A set of fully
distributed tracking algorithms is proposed, which answers the query whether a target remains in a
“specific area” (called a “face”). When a target moves from one face to another face all the possible
movements will be mentioned. Then query will be sent to all those nodes about their energy and

29

coverage area. Based on the response from those nodes the best nodes will be selected for continuing
tracking when the target moves to the next face. The result of this t-Tracking is compared with already
existing face tracking.

IMAGE PROCESSING BASEDON STUDENTS ATTENDENCE SYSTEM
AUTHORS: P.NIVETHA S.KIRUTHIKA

SRISHANMUGA COLLEGE OF ENGINEERING AND TECHNOLOGY
ABSTRACT

India is one the Country with High dense population. Due this high population Transportation and
Parking of the Vehicles is the major issue faced by the Peoples. This Paper is to Provide Intelligent Parking
System through Image Processing. In this Systematic Approach the Image Processing Technique can be
used to identify the free empty Parking area to Park our Vehicles. In the Proposed process the Parking area
can be marked with certain specific number and sensor and with the help of the sensor the empty space can
be identified to park the vehicle. The Image processing Display consists of the seven segments of display in
real time. The Seven segment display can be used to identify the empty parking area with specific numbers.
The specific numbers can be displayed in order to park the vehicle at vacant position without any struggle.
The proposed process can be implemented in software platform with the help of Image processing technique
and Hardware implemented by interfacing with ARBINDO UNO.

DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM USING TWO
FACTORS

AUTHORS: KAMALI, AGALAYA.M
SRI-SHANMUGA COLLEGE OF ENGINEERING AND TECHNOLOGY

ABSTRACT
In this system a sender sends encrypted information to a receiver through a cloud storage server. The
sender only knows the identity of the receiver but no other information such as its public key or its
certificate. The receiver decrypts the cipher text to perform two things. The first thing is his/her secret key
stored in the computer. The second thing is a unique personal security (user name and password). It is
impossible to decrypt the cipher text without either piece. This can be done by the cloud server which will
execute some algorithms to change the existing cipher text to be un-decrypt able by this device. This process
is completely known to the sender. The cloud server cannot decrypt any cipher text at any time.

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN VEHICULAR SCENARIO FOR TCP
APPLICATION

AUTHORS: SUGANYARAJ RAMESH
PSG COLLEGE OFTECHNOLOGY
ABSTRACT

Vehicular connectivity can be considered as the coming generations’ killer application. The vehicle-to-
vehicle connectivity is immense for the improvement of Intelligent Transportation System (ITS) in order to
provide a wide spectrum of applications, including safety-related, traffic control, and entertainment. Some
important characteristics that distinguish vehicular ad hoc networks (VANETs) from mobile ad hoc
networks are highly dynamic topology and fast movement of nodes. Hence, the protocols designed for
mobile ad hoc networks (MANETs) cannot be simply adopted in vehicular ad hoc networks (VANETs). In
this paper simulation based experiments have been performed to analyze the performance of Destination
Sequenced Distance Vector (DSDV), Optimal Link State Routing (OLSR) and ADHOC On Demand
Distance Vector (AODV) routing protocols on the basis of Packet Delivery Ratio, End to End delay and

30

Average Throughput for TCP applications by Network Simulator (NS-3.19) using mobility model generated
through Simulation of Urban Mobility (SUMO) tool. The results are compared by varying number of nodes.
The analysis shows that OLSR routing protocol outperforms the other routing protocols AODV and DSDV
and best to be used in vehicular ad hoc network for TCP applications.

EVALUATION OF MACHINE LEARNING ALGORITHM FOR CROP YIELD PREDICTION
AUTHORS: P.PRIYA U.MUTHAIAH

SRI-SHANMUGAH COLLEGE OF ENGINEERING AND TECHNOLOGY
ABSTRACT

The Agriculture plays a dominant role in the growth of the country’s economy. Climate and other
environmental changes has become a major threat in the agriculture field. Machine learning (ML) is an
essential approach for achieving practical and effective solutions for this problem. Many comparisons of
ML algorithms for yield prediction have been made, seeking for the most accurate algorithm. This paper
compares the predictive accuracy of Random Forest and Naive algorithms for crop yield prediction. Real
data of Tamil Nadu were used for building the models and the models were tested with samples of two
consecutive years. The results show that which algorithm used to attain the accurate yield for the crop using
Naive Algorithm.
ARTIFICIAL AGENT BASED APPROACH FOR ENVIRIONMENTAL ANALYSING USING WSN & IOT

AUTHORS: Y.JENIFER, S.RESHMA
ST.ANNE’S CET, CUDDALOR
ABSTRACT

In this paper we reveal a small idea which can be used to analyze the environment using artificial
intelligence agent. We are all known that artificial intelligence has done many things which could not do by
human beings manually. Artificial Intelligence is the ability to think, to understand, to recognize patterns, to
memorize, to make choice from alternatives and to learn from experience. Artificial Intelligence is to make
replica of human brain’s capabilities so that the computers start doing all those activities that the human is
doing and in much less time. The ability of an artificial entity such as a computer machine that makes it so
intelligent to solve complex problems that is otherwise possible only by human brain is called artificial
intelligence. In recent years, we have seen a new era of short range wireless technologies like Wi-Fi,
Bluetooth, ZigBee , emerging in front of us. This is a small idea of analyze the environment by using the
combined recent technologies such as artificial intelligence, wireless sensor network and internet of things.

STEGNOGRAPHY SYSTEM
AUTHORS: RAMJAN FASEELATH.K, VENGAT LAKHMI.G

DHIRAJLAL GANDHI COLLEGE OF TECHNOLOGY
ABSTRACT

Steganography is the technique of hiding private or sensitive information within something that
appears to be nothing out of the usual. Steganography is often confused with cryptology because the two are
similar in the way that they both are used to protect important information. The difference between the two
is that Steganography involves hiding information so it appears that no information is hidden at all..
Steganography as well as used in data encryption techniques in several of fields. Steganography also
includes projects in cybercrimes. In this paper, we describe about steganography techniques, applications,
advantages,tools and their current projects in steganography.

31

CLOUD COMPUTING
AUTHORS: N.RAJENDRAN, S.VIJAI
SENGUTHAR COLLEGE OF ENGINEERING

ABSTRACT
With the development of cloud computing ,Data security becomes more and more important in cloud
computing .This paper analysis the basic problem of cloud computing data security .Cloud Computing
provides a way to share distributed resources and services that belong to different organizations or sites
.Since Cloud Computing share distributed resources via networking in the open environment thus it makes
security problems .In this method some important security services including authentication ,encryption and
decryption and compression are provided in Cloud Computing system. Cloud Computing offers better
computing though improved utilization and reduced administration and infrastructure costs .It is rapidly
growing as an alternative to conventional computing .This could help in better understanding of the
concepts of cloud computing.

PRECISION AGRICULTURE
AUTHORS: RADHAPRIYA.R, SANGEETHA.M
DHIRAJLAL GANDHI COLLEGE OF TECHNOLOGY

ABSTRACT
Precision agriculture technique which comes under the concept of Data Mining. Agriculture in India
play a vital role for economy and employment.Precision agriculture is a modern farming technique that uses
research data of soil characteristics, soil types, crop yield data collection and suggests the farmers the right
crop based on their site- specific parameters. It provides the better improvement for farmer to prevent them
from loss crops. It provides the better input and eff iciency and better decisions for regarding farmer.The
goal of PA to ensure that Profitability, Sustainability and Protection of the environment.PA is also known
as"Satellite Agriculture" as needed farming and Site - Specific Crop Management(SSCM).This technique
which will provides guideness for farmers about crop rotation ,harvesting times and soil management.

NEUROMORPHIC ARCHITECTURES
AUTHORS: NANDHINI.S, PAVITHRA.K
DHIRAJLAL GANDHI COLLEGE OF TECHNOLOGY

ABSTRACT
The Human Brain Project will construct and operate a Neuromorphic Computing Platform consisting
of two complementary hardware systems and the software infrastructure necessary for their operation. The
size and the research opportunities of the HBP hardware systems will be unrivaled. They offer the first and
so far only generic and remotely accessible Neuromorphic computing facilities to perform research on this
new computing paradigm. It provides hardware and software developers and the user community with a
echnically detailed, comprehensive and quantitative description of the systems under construction. It also
enables administrators to monitor progress using a set of high-level “key-performance-indicators (KPIs)”.

APACHE HADOOP
AUTHORS: R.SENTHAMIZH SELVI, P.SOWMIYA
M.P.NACHIMUTHU M.JAGANATHAN ENGINEERING COLLEGE

ABSTRACT
Apache Hadoop is an open-sourcesoftware framework used for distributed storage and processing of
dataset of big data using the MapReduce programming model. It consists of computer clusters built from
commodity hardware. All the modules in Hadoop are designed with a fundamental assumption that
hardware failures are common occurrences and should be automatically handled by the framework. The

32

core of Apache Hadoop consists of a storage part, known as Hadoop Distributed File System (HDFS), and a
processing part which is a MapReduce programming model. Hadoop splits files into large blocks and
distributes them across nodes in a cluster. It then transfers packaged code into nodes to process the data in

parallel. This approach takes advantage of data locality, where nodes manipulate the data they have access
to. This allows the dataset to be processed faster and more efficiently than it would be in a more
conventional supercomputer architecture that relies on a parallel file system where computation and data are
distributed via high-speed networking.

A SMART HELMET FOR AIR QUALITY AND HAZARDOUS
EVENT DETECTION FOR THE MINING INDUSTRY

AUTHORS: SUMIT KUMAR CHAUDHARY, VIKASH KUMAR
EXCEL ENGINEERING COLLEGE
ABSTRACT

A smart helmet has been developed that is able to detect of hazardous events in the mines industry. In the
development of helmet, we have considered the three main types of hazard such as air quality, helmet removal, and
collision (miners are struck by an object). The first is the concentration level of the hazardous gases such as CO, SO2,
NO2, and particulate matter. The second hazardous event was classified as a miner removing the mining helmet off
their head. An IR sensor was developed unsuccessfully but an off-the shelf IR sensor was then used to successfully
determine when the helmet is on the miner’s head. The third hazardous event is defined as an event where miners are
struck by an object against the head with a force exceeding a value of 1000 on the HIC (Head Injury Criteria). An
accelerometer was used to measure the acceleration of the head and the HIC was calculated in software. The layout of
the visualization software was completed, however the implementation was unsuccessful. Tests were successfully
done to calibrate the accelerometer. PCB’s that were designed and made included a breakout board and a prototype
board. A whole software implementation was done based on Contiki operating system in order to do the control of the
measuring of sensors and of calculations done with the measured values. This paper presents the undertaken design
detailing solutions to issues raised in previous research.

MOBILE COMPUTING
AUTHOR: SANGEETHA.P

ABSTRACT
Mobile Computing is a term describes technologies that enable the users to access the network from any place
at any time. Ubiquitous computing and nomadic computing are synonymous with mobile computing. The need to
access the network without location constraints. Mobile computing is a computing paradigm that allows users to
access the network not only from fixed locations, but also while moving or in transit. Mobile computing technology is
improving and becoming more feasible. Mobile computing involves connection with the network and data processing.
Using phones from anywhere in the world is not mobile computing because there is no data processing involved.
Using a laptop while moving is not mobile computing if there is no connection to a network. Mobile Computing
comprises of applications in various fields such as commercial, medical, defense, networking and electronic devices
etc. This article explains how this technology could be implemented, and what uses it could serve.

CLOUD COMPUTING AND ITS CURRENT TRENDS
AUTHORS: NANDHI.S, KOHILA.A

NANDHA ENGINEERING COLLEGE
ABSTRACT

Cloud computing is the practice of using a network of remote servers hosted on the internet to store, manage
and process data rather than a personal computer. It is the way of computing in which IT users share the resources and
services that are distributed over different organizations or sites. Eg: salesforce. This paper will describe about the
components of cloud (client, distributed servers, datacenters), deployment of cloud services
(private,public,hybrid,community)and the service models such as SaaS, PaaS and IaaS and applications of cloud
computing. And also describing some of the current trends in cloud computing which are surveyed by Rightscale
company.

33

STUDENTS ARTICLES

TAMIL CULTURE
R.BANUMATHI -- IV IT

R.BANUMATHI -- IV IT

34

LORD GANESH
J. BHARATHI -- III CSE

MICKY MOUSE
S.CHARLY -- IV IT

35

VINAYAGAR
M.BOOPATHIRAJ -- II IT

36

S.CHARLY -- IV IT Y.DEVAYANI -- II CSE

SEMMOZHIYANA TAMIL MOZHI
T.DEVI BHARATHI -- II CSE

37

G.SANDHIYA -- IV CSE J.GAYATHIRI-- II CSE

J.MONISHA -- IV CSE

M.JOTHY -- III CSE

V.LOGESWARI-- IV CSE

38

LORD MURUGA
V.KASTHURI -- IV CSE

39

Y.KRISHNAVENI -- III CSE G.MALINI -- III CSE

M.HEMALATHA -- II CSE S.MANIMEGALA – IV CSE

40

R.NIVITHRA – IV CSE P.JYOTHI -- III CSE

P.NITHYA -- III CSE

N.PUTTULAKSHMI -- II CSE

41

R.SANTHIYA – III CSE

V.RADHIKA – IV IT

C.RANJITHA -- IV CSE

S.MEENATCHI -- IV CSE

42

P.SANTHIYA -- II CSE

D.SEVVANTHI -- IV IT

SONA S KONDOOR -- IV IT P.SOWMIYA -- III CSE

43

P.SOWMIYA -- III CSE

S.SUDHAKARN -- III CSE

SREE LAKSHMI -- IV CSE

44

....

...

-
....
...

... -
- ...

-
-

-

-
...

JANARTHANAN.P
(III CSE)

...

...
...
...

45


Click to View FlipBook Version