EDU Home Apply Great Place To Work


Counselling Code

Great Place To Work

Conference and Books

Conference and Books

List of Books/Book Chapters/Conference

S.NoName of the FacultyTitle of the paper/Title of the book/chapters published
1Mr.Mani Deepak ChoudhrySmart Car Safety Mechanism for Theft Detection and Alcohol Content Detection (C)
2Mr.Mani Deepak ChoudhryVideo Synthesis Strategies for IORT Environments: Research Challenges and Opportunities - c
3Dr.N.Sankar RamAn improved random forest algorithm for effective agriculture price prediction system trending towards machine learning - C
4Ms.Suganya TSmart agriculture plant disease detection using deep learning
5Ms.Suganya TCustomer life time value prediction
6Ms.Sowmya.HDiet Recommendation System using Machine Learning
7Ms.Kogilavani.BSentiment Analysis of Customer Reviews Using Hybrid Evolution Using SVM and Naïve Bayes
8Mr.Mohanraj.SAutomated review system using facial expression for restaurant
9Ms.Janani.S, Ms.Nithya.VDetection and recognition of face using deep learning
10Dr. Hemalatha BComputational Intelligence in Robotics and Automation
11Mr.Rajiv kumar NBasics of Robotics and its applications
12Mr.Rajiv kumar N3D Printing and its applications
13Ms. Nithya VData Mining and Data Warehousing
14Ms.Poongodi.JFundamentals of Data Structures
15Ms.Janani KArtificial intelligence
16Mr.Senthil.JOperating System Concepts
17Dr.Prabhavathy PInnovative techologies and its applications in higher education - humanities
18Dr.Prabhavathy PMigration, Trauma and Identity in Modern Novels
19Dr.Prabhavathy PPost colonialism in the novels of salman rushdie
20Dr.Senthilkumar K GArtificial Intelligence Applications in Human Resource Management
21Dr.Vigneshkumar P Dr.Divya P, Dr.Geethamani PNanometal Oxides in Horticulture and Agronomy
22Dr.Venugopal.TBiomass Conversion and Biorefinery (Springer)q
23Mr. Rahgul Poopathi M.KBrain Tumor Classification using crow Search, Lion Explorations, and Whale Optimization Algorithms in Digital Image Processing Application
24Mr.Sakthimohan, Elizabeth Rani. GDevelopment of an Automated Hand Gesture Software to Control Volume for Computer
25Dr.K.S.M SwaminathanICT Skills using by the Faculty members of Anna University affiliated Engineering Colleges in Coimbatore: A study (C).
26Mani Deepak ChoudhryMachine Learning Frameworks for Indutrial Internet of Things (IIoT): A Comprehensive Analysis (c )
27S.JeevanandhamMachine Learning Frameworks for Indutrial Internet of Things (IIoT): A Comprehensive Analysis (c)
28Ms.T.BhuvaneswariImproving performance using hybrid framework iot communication in cloud computing
29Mani Deepak ChoudhryIoRT based Denoising Video Streams through Employing Special Filtering Systems in Health Care Region ( c )
30S. RajasekaranElderly Care using Generative Adversarial Networks (GANs) on Deep Video Analysis
31Ms. B.KogilavaniSensor Based Safe Driving Using Road Sign REcognition and Image Analysis
32Dr.S.K.MydhiliMachine Learning Algorithms in 5G Cellular Network for Efficient Cognition
33Dr. Rajkumar NFuzzy Neural Network Classification Model for Multi Labeled Electricity Consumption Dataset
34Mani Deepak ChoudhryEdge Information Systems Based Blockchain Frameworks For Industrial IOT a Novel Approach ( B )
35Mani Deepak ChoudhryAn Efficient 24 x 7 Patient’s Vital Parameter Monitoring Framework using Machine Learning based Internet of Biomedical Things: A Comprehensive Approach (b)
36Dr.P.Vignesh KumarChapter 16 Actinomycetes-assisted nanoparticles: Synthesis and applications
37Dr.P.PrabhavathyPost colonialism in the novels of salman rushdie: a social critique ( as a first author of the reference book)
38Dr. R. Arun ChakravarthySmartphone Syndrome (b)
39Mr.N.Rajiv KumarProfessional Ethics in Engineering
40S. RajasekaranSenior citizen care using micro expression analysis on live elderly video (mea-lev) C
41Dr. Karunambiga KEfficient Detection of Compromised Secondary User in Cognitive Wifi Networks Using Ga-Fhp
42Dr. S. Vimal KumarEffect of magnetic field on the peristaltic transport of Oldroyd-B fluid in an asymmetric inclined channel
43Dr. Rajkumar NMulticlass Hierarchical Fuzzy Classification on Multi labeled Dataset
44Dr.P.RajkumarNetwork Security Analysis for Signal Strength based Packet Filtering
45Dr.P.Geethamani& Dr.P.DivyaPathological Conditions Related to Bisphenols and It’s Compounds
46Ms.T.BhuvaneswariAutomated monitoring and detection system of strep throat using fpga
47Sruthi Mol PAssimilate Hacking : Beginners Guide to Ethical Hacking
48Sruthi Mol PHuman Computer Interaction: Fundamental And Practices On Human Computer Interaction
49Selvavinayagam GCryptanalysis
50Selvavinayagam GCyber Security
51Selvavinayagam GRudiments of Computer Security
52Selvavinayagam GAutomata Theory
53Selvavinayagam GDestiny is Yours: A Personality Development Guide
54Selvavinayagam GEmerging Trends in Information Technology
55Selvavinayagam GCellular Automata based Cryptosystem
56Selvavinayagam GCryptography: Principles and Applications
57S.D.NandakumarBayesian Analysis for Tiles Classification using Stochastic Neighbor Embedding Technique
58M.AnanthiNetwork Security Analysis for Signal Strength based Packet Filtering
59R.JagedeswariStudy on the shear strength property of black cotton soil subjected to lime and flyash stabilized swell control process
60Dr.A.Pasumpon PandianSmart Digital Assistant
61Dr.S.K.MydhiliHealth Alert Application for Region
62Dr.S.K.MydhiliEfficient Travel Management System based on RPA
63Ms.B.Lanitha3D INTERNET - A Survey
64Ms.B.LanithaE-Commerce Data Manipulation using RPA
65Ms.B.LanithaFraudulent Account Closing using RPA
66Mr.S.D.NandakumarData Backup and Restoring using RPA
67Mr.S.D.NandakumarEmployee Management System
68Mr.S.D.Nandakumar, Mr.S.SuseendranOptimized Energy Aware Routing in Wireless Ad-hoc Network
69Mr.R.SureshKumarInvoice Processing uisng RPA
70Ms.A.Suganthi, LanithaA Review of Fast Mutual Authentication and Key Exchange in Mobile Communications
71Ms.S.SivaranjaniInsurance Policy Endorsement Based on Andriod System
72Mr.S.SuseendranSteganalysis of Images using QRC
73Mr.S.SuseendranElectronic - Know Your Customer(E-KYC) using RPA
74Ms.R.JayashreeSecurely Delivering Desktop Application to Web Browser
75Ms.R.JayashreeBig Data Challenges for E-Mobility - INFRA Operator
76Ms.V.KamalaRange and Location Based Privacy Aware Monitoring for Dynamic Objects
77Ms.V.KamalaVehicle Theft Analysis
78Ms.V.KamalaStudent Information System using Cloud Computing
79Ms.M.ShanthiniInvestigating the Loss of Insurance Renewal
80Ms.T.N.ArunaOnline Coding Tool
81Ms.T.N.ArunaVehicle Showcase Augmented Reality App with AI Bot
82Ms.K.PoongothaiPrice Change Notification Bot
83Ms.K.PoongothaiEnergy Proficient Based Routing Protocol Assortment in Ad-Hoc Networks
84Ms.G.G.SreejaData Analysis for Vehicle Claims
85Mr.V.VivekanandanTime and Productivity Analysis
86Mr.V.VivekanandanAutomated Travel Insurance Chatbot
87Ms.R.VinolinaAgent Insurance Renewal
88Ms. Rithmi Mitter, Ms. Rajeswari VAnalysis of Optimization Methodology for Secure Cryptosystem Using Low Power Vlsi Design Techniques
89Ms. Vijay Shree M, Ms. Anitha SAnalysis of Biomarkers for Earlier Medical Diagnosis Using Neural Networks
90Mr. Vellingiri, Ms.ShanmugapriyaApplication Dependent Fault Diagnosis Of FPGA For Low Power Reconfigurable Systems
91Ms. Prema, Ms. KeerthanaLandmine Detection Robot
92Mr.Vinod K S, Mr.Sriram AyyapanHuman Face Detection and Tracking in Color Image and Video
93Mr.B.Sathiyasivam, Ms. BhuvaneswariAuthentication Scheme for Medicine Anti-Counterfeiting System Using IOT
94Mr.Vishnuvinayagan R, Mr.SivaprakashMinimization of Handoff Failure by Introducing WLAN
95Dr.N.KaleeswariSmart Monitoring of Heart Over IOT Using Raspberry Pi
96Mr.Sriram Ayyapan, Mr.K.S.VinodEffective Solar Power Control for Houses
97Dr.M.ArunA Survey based on Digital Signal Processing in Smart Antenna System
98Dr.R.Arun ChakravarthyLI-FI Based Smart Shopping
99Ms. Rithmi MitterWireless Automatic Irrigation Using IOT
100Mr. Vellingiri AAutomated Energy Meter Reading Using LORA
101Mr.Sathiya Sivam.BIOT Based Baby Monitoring System Using Rasberry Pi
102Dr.N.KaleeswariMedical Equipment Management and Tracking System Using IOT and WSN
103Ms. Vijayshree MWearable Safety Device and Health Monitoring System
104Ms. Rithmi MitterAutomated Attendance Monitoring System using RFID Technology
105Ms. Vijayshree MVehicle Tracking System using LORA Devices
106Ms. BhuvaneswariSafeguard For Vehicle Using LORA
107Ms. BhuvaneswariNon Invasive Blood Group Detector using IR Sensor
108Mr.SivaprakashEarly warning system from threats for wild animals using raspberry pi
109Ms. S. AnithaTrain Accident Precaution and Station Information System
110Mr.Vishnuvinayagan RDesign and Control of Mobile Scramblers
111Mr.Sriram AyyapanVisual Motor Skills for Low Cost Robots
112Sathiyasivam.BPharmaceuticals Authentication System Using Open CV
113Keerthana K.PObject Monitoring Using Image System with Underwater Vehicle
114Dr S.RajeswariLUO Converter Based Solar PV System
115V.RajeswariIOT Based Power Demand Controller
116A.SuganthiTwitter Based Sentiment Analysis
117Mr.V.VivekanandanSplit and Combiner Method of Cryptography for Cloud Storage Security
118Mr.R.Suresh KumarSplit and Combiner Method of Cryptography for Cloud Storage Security
119Dr.S.K.MydhiliDual Watermarking in Tele-radiology using DWT for Data Authentication and Security
120Dr. M.SeenivasanOccupational Health and Safety Analysis in Manufacturing Industries
121Dr.S.K.MydhiliAn Efficient Attendance Monitoring System using RFID Technique
Conference and Books