Back close
Development of Text / Language Independent Speaker Recognition System
Development of Text / Language Independent Speaker Recognition System

Speaker recognition systems are useful for deriving intelligence information by tracking telephone conversations of people who are perceived to be a threat to the national security. Rules prohibit security agencies. . .

Read more
Advanced Threat Collection Platforms
Advanced Threat Collection Platforms

Attacks on information systems have grown exponentially in volume and in sophistication. While there are many security systems and ‘honeypots’ designed to harvest or trap the malware and study its. . .

Read more
Security Event Processing Acceleration using GPGPU
Security Event Processing Acceleration using GPGPU

The project ‘Security Event Processing Acceleration Using GPGPU’ proposes to provide a proof of concept for building a FPGA based NIDS for highspeed network environments. The proposed FPGA based NIDS would. . .

Read more
Development of Visual Cryptographic Schemes
Development of Visual Cryptographic Schemes

Visual cryptography is a perfectly secure way to protect secrets and is characterized by its decryption method. This project is to develop new visual cryptographic scheme satisfying certain conditions. In. . .

Read more
Indoor Information Representation and Management System
Indoor Information Representation and Management System

The project titled “Indoor Information Representation and Management System” is funded by Department of Science and Technology, India. Dr. Vidhya Balasubramanian, Associate Professor, Department of Computer Science Engineering, Amrita School of Engineering, Coimbatore, is the Principal Investigator. 

Read more
Indoor Information Representation and Management System (IIRMS)
Indoor Information Representation and Management System (IIRMS)

An indoor information system is a system that gives information about the details of a building such as the different spaces within the building, exits, and their properties and also. . .

Read more
Indoor GIS
Indoor GIS

The goal of this project is to create a hierarchical extendible data model for indoor information which can represent buildings, entities within it, utilities, objects inside the building, and sensors. . .

Read more
Video Analytics based Identification and Tracking in Smart Spaces
Video Analytics based Identification and Tracking in Smart Spaces

Over the recent years, video camera networks have become ubiquitous and a part of our everyday environments. Such camera networks are deployed in a wide gamut of applications ranging from. . .

Read more
Predictive Threat Evaluation in Complex IT Systems
Predictive Threat Evaluation in Complex IT Systems

COTS Security Incident and Event Management (SIEM) Systems process log events based on built-in rules and identify actionable incidents. These primarily identify known attacks. Using Machine Learning techniques such as. . .

Read more
Admissions Apply Now