M.C.A

Department of MCA

About the Department

The Department of Master of Computer Applications was started in the year 1995 and now the intake is 60 students. This course is affiliated to Bharathidasan University, Trichy, Tamil Nadu. The department offers both Regular Stream (duration : 3 years) and Lateral Entry Stream (duration : 2 years) is exclusively for B.Sc. (CS), BCA and B.Sc.(I.T). Our department has well trained faculties and equipped laboratories to meet global challenges in the field of Computer Science. The department has been producing good results continuously in most of the University Semester Examinations from the first batch.  Some of our students have got University ranks. Students exposure to real world is improved by encouraging them to participate in various symposiums held on other colleges. The department frequently invites resource persons from top IT corporate to conduct seminars, workshops and guest lecturers that facilitate the students to enrich their knowledge with the latest technologies that stand in the field of Information Technology. Students are assisted to get main project Internship with placement.       Also most of our students are placed well in reputed top IT companies in various parts of the world.

Vision & Mission

MCA is an outstanding department contributing significantly to teaching, research and consultancy, through well equipped laboratories and well trained staff to meet global challenges in the field of Computer Applications. Imparting quality technical education and providing skills in Computer Application through best of practices. Producing graduates who can contribute professionally to the society and widely as IT professionals or entrepreneurs.

HOD / Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor

Mr.K.Makesh Babu, MCA., M.phil, M.S, PGDBA, (Ph.D)
Head & Assistant Professor,
E- Mail id : makeshbabu.k@gmail.com

Research

Major Research Area

  • Data Structures and Algorithms
  • Big data analytics
  • Computer Networks
  • Network Security

S.no

NameUniversityYear

Topic

1.Dr. K.ThamodaranAlagappa University2014Optimized Image security mechanism for content management

S.No

NameDesignationStatus

Area of research

1.K. Makesh BabuAsst. ProfPursuingData Profiling

INTERNATIONAL CONFERENCE

S.No.NameInternational Conferences 
1.Dr.K.Thamodaran1.      “Optimized Partial Image Encryption Scheme Using PSO”, Proceedings of IEEE – International Conference on Pattern Recognition, Informatics and Medical Engineering, (PRIME-2012) organized by Periyar University, Salem, Tamilnadu, India, pp 236-241, March 21-23, 2012 (ISBN: 978-1-4673-1039-0).

2.      “Optimized Image Watermarking Scheme Based  On  PSO”, Proceedings of ELSEVIER – International Conference on Modeling Optimization and Computing (ICMOC-2012) organized by Noorul Islam University, Thukkalai, Tamilnadu, India, Vol 38, pp 493-503, April 10-11, 2012. (ISBN: 1877-7058).

3.      “PSO Based Optimized Security Scheme For Image Authentication and Tamper Proofing”, AIRCC Second International Conference on Signal, Image Processing  and Pattern Recognition(SPPR2013), AIRCC Computer Science & Information Technology (CS & IT) proceeding (CSCP2013),  pp143-152, May 2013. (ISBN: 2231-5403).

2K.Mahesh BabuValidationg a Bigdata Environment using various data profiling analysis,IJSTR,VOL8, ISSUE 10

OCT 2019, ISSN 2277 – 8616

NATIONAL CONFERENCE

S.No.

Name

National Conferences

1.Dr.K.Thamodaran1.      “Hybrid Image Security Mechanism For Image Authentication and Copyright Protection”, Ninth National Tamil Conference  at  Alagappa  University, Karaikudi, pp 310, September 2009 (ISBN : 978-93-80043-33-3).

2.      “Mathematical Concepts In Image Encryption Techniques”, National Conference on Recent Trends in Mathematics and its Applications at Alagappa University, Karaikudi, December 2010.

3.      “Integration of Technology with Education – Opportunities and Challenges”, National Seminar on Integrating Technology with Education at Alagappa University, Karaikudi, on 25th and 26th , March 2011

2.B. MenakaImage processing-2012, JMC College, Trichy-20

JOURNALS

S.No.

Name

Title

1K. Makesh Babu“Support Vector Machine Based Model to Stroke Risk Prediction” Asian Academic Research Journal of Multidisciplinary, Volume 1, Issue 15, Nov 2013
2.Dr.K. Thamodaran1.      “A Novel Security Mechanism for Image Authentication And Copyright Protection”, International Journal of Computer Applications,   Vol.4, No.3, pp 14-19, July 2010 (ISSN: 0975-8887).

  1. “An Efficient Encryption Scheme for Color Images Using Transpose, Interweaving and Iteration Method”, CiiT International Journal of Digital Image Processing, Vol.2, No.1, pp 357-363,  October 2010 (ISSN: 0974-9691).(IF 0.562)
  2. “Performance Evaluation of Optimized Digital Image Watermarking Technique For Copyright Protection Using DWT, DCT and GA”, International Journal of Computational Intelligence Research” Research India Publications, India, Vol.6 No.4, pp 887-894, 2010 (ISSN: 0973-1873).
  3. “Optimized Hybrid Image Security Scheme For Copyright Protection, Authentication and Confidentiality Using PSO”, European Scientific Journal , vol.9, No.6 pp 129-146, February 2013. (ISSN:1857 – 7881).
  4. “Optimized Hybrid Security Mechanism for Image Authentication And Secrecy Using PSO”, International Journal of Network Security and Applications, vol. 5, no. 5, pp 115-128, September  2013. (ISSN:0975 – 2307).
  5. “Optimized Partial Image Encryption Scheme Based on PSO and DE”, Journal of Computer Science and Applications  vol.6, No.1 pp335-340, March, 2014.(ISSN: 2231 –1270).
  6. “Optimized Data Encryption System Based on GA”, SSRG International Journal of Computer Science and Engineering – vol 2, No. 9, pp 24-30, September 2015. (ISSN: 2348 – 8387).
  7. “DE and PSO Based Hybrid Optimized Watermarking System for Copyright Protection And Authentication”, International Journal of Advanced Technology in Engineering and Science, vol 3, No. 9, pp 52-62, September 2015. (ISSN: 2348 – 7550).
  8. “Security Scheme for Data Authentication Based on Elliptic Curve Cryptography”, International Journal of Computer Science & Engineering Technology, Vol. 7 No. 04,pp 156-162, April  2016. (ISSN : 2229-3345).    
  9. “An Inventive Image Security System Based on Massey-Omura Encryption with Group”, International Journal of Advanced Research in Science, Engineering and Technology, Vol. 3, Issue 9 ,pp 2656-2667, September 2016.( ISSN (Online): 2350 – 0328).

11.  “Dynamic Multi-Keyword Ranked Search Based Security Mechanism for Cloud Data Management”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, Issue 9, pp 262-270, September 2016.( ISSN 2278-1021)

  1. “Security of Big Data in Cloud Environment Using Dynamic Policy Updating System”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.4, Issue 9, pp 15957-15966, September 2016,  (ISSN: 2320-9801).
  2. “Secured ICMP Based IP Traceback Scheme to Trace The Spoofed IP Locations”, International Journal Of Engineering And Computer Science, Vol.5 Issue 10 Pp  18232-18238, Oct. 2016.(ISSN: 2319-7242).
  3. “Improving the performance of cloud storage through elimination of duplicate encrypted big data”,   international journal of engineering sciences & research technology, vol 6. No. 10, 2017, pp 314-328. (ISSN: 2277-9655).
  4. “Identification of Dropout Packets in Wireless Sensor Networks”,  International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol 2 No. 5, pp 636-645, 2017.(ISSN : 2456-3307).