Back close
Development of Visual Cryptographic Schemes
Development of Visual Cryptographic Schemes

Visual cryptography is a perfectly secure way to protect secrets and is characterized by its decryption method. This project is to develop new visual cryptographic scheme satisfying certain conditions. In. . .

Read more
Indoor Information Representation and Management System
Indoor Information Representation and Management System

The project titled “Indoor Information Representation and Management System” is funded by Department of Science and Technology, India. Dr. Vidhya Balasubramanian, Associate Professor, Department of Computer Science Engineering, Amrita School of Engineering, Coimbatore, is the Principal Investigator. 

Read more
Indoor Information Representation and Management System (IIRMS)
Indoor Information Representation and Management System (IIRMS)

An indoor information system is a system that gives information about the details of a building such as the different spaces within the building, exits, and their properties and also. . .

Read more
Indoor GIS
Indoor GIS

The goal of this project is to create a hierarchical extendible data model for indoor information which can represent buildings, entities within it, utilities, objects inside the building, and sensors. . .

Read more
Video Analytics based Identification and Tracking in Smart Spaces
Video Analytics based Identification and Tracking in Smart Spaces

Over the recent years, video camera networks have become ubiquitous and a part of our everyday environments. Such camera networks are deployed in a wide gamut of applications ranging from. . .

Read more
Predictive Threat Evaluation in Complex IT Systems
Predictive Threat Evaluation in Complex IT Systems

COTS Security Incident and Event Management (SIEM) Systems process log events based on built-in rules and identify actionable incidents. These primarily identify known attacks. Using Machine Learning techniques such as. . .

Read more
Towards Next-generation Adaptable Computing
Towards Next-generation Adaptable Computing

Computationally intensive applications are very diverse. As a consequence, the next generation computing architectures are expected to be heterogeneous—comprising variable granularity computing blocks with varied communication mechanisms. Capturing this heterogeneity. . .

Read more
Unifying the design of Heterogeneous Systems
Unifying the design of Heterogeneous Systems

Today’s computing systems are heterogeneous, with diverse microarchitectures. It is common to design systems comprising multi-core CPUs, Graphic Processing Units (GPUs) and Field Programmable Gate Arrays (FPGAs). Each of these. . .

Read more
Malware detection using FPGA, Sandboxing and Machine Learning
Malware detection using FPGA, Sandboxing and Machine Learning

Dr. T. Senthil kumar, Dr. T. Gireesh Kumar, Dr. Harish Ram D. S. received a grant of USD 12000 (Rs 7,68,000) under the IBM Shared University Research (SUR) scheme for a project. . .

Read more
Admissions Apply Now