ROEVER ENGINEERING COLLEGE
(Approved by AICTE and Affiliated to Anna University)
Nationally Accredited by NAAC
Email : office@roeverengg.edu.in | Phone: 04328 – 325116 | Fax: 04328 – 278110 | Mobile : 9750970158, 9750970167, 9750970112
 
You are Here HOME / CSE / Projects
 
Department of CSE
Introduction
Facilities
Faculties
Events
Rank Holders
Projects
Placements
Achievements
Department of Computer Science Engineering

UG PROJECTS

ACADEMIC YEAR: 2014-2015

S.No. STUDENTS NAME PROJECT TITLE
1 PIRAI NILA R KEY LOGGING - RESISTANT VISUAL AUTHENTICATION PROTOCOLS
SATHIYA P
SUGUNA R
2 SUGAPRIYA N SEARCH ENGINE FOR COMPUTING JOBS USING CLOUD SERVER
VINITHA V
PRIYANKA M
3 ANANTHI S ANDROID APPLICATION FOR TO - DO LIST
ANUSHA S
4 MAHALAKSHMI G VISUAL CRYPTOGRAPHY
SATHYA M
NUSHRATHUNNISHA S
5 DEEPA S VISPN : VANET BASED SECURE AND PRIVACY PRESERVING NAVIGATION
SUGANYA K
SUGANTHI T
6 REVATHI R ENABLING DATA INTEGRITY PROTECTION IN AGGREGATE KEY BASED CLOUD STORAGE
RITA JOICE I
7 ELAKKIYA C IMPLEMENTATION OF VOTING SYSTEM USING PALM PRINT IDENTFICATION TECHNIQUE
SIVARANJANI S
THENNAVAL D
8 GIBIN GEORGE PRESERVING LOCATION PRIVACY  IN GEO SOCIAL APPLICATIONS
JAIN JOSE.T
STEBIN ANTO
9 ARIVALAGAN BANK ACCOUNT TRACKING
MANOKARAN N
PRAKASH V M
10 ARUL MOZHI SELVAN T A CLUSTERING BASED COLLABORATIVE FILTERING APPROACH FOR BIG DATA APPLICATION
AYYAPPAN V
JAYAPRAKASH G
VINOTH S
11 ADARS K CLASSIFICATION RANKING ON KNOWN AND UNKNOWN LABELS FOR SYBIL DETECTION
ATHUL N P
SHEBIN K S
VISHNU N V
12 LUNGANGAM D DISTRIBUTED CLIENT SERVER ASSIGNMENT FOR ONLINE SOCIAL NETWORK APPLICATION
MUTHUVEL G
PARTHIBAN S
13 KOGULAN S AN - ATTRIBUTE - ASSISTED RERANKING MODEL FOR WEB IMAGE SEARCH
MANIKANDAN M
RAJA P
VIJAYAKANTH P
14 ARYA SUGUNAN EFFICIENTLY SEARCHING NEAREST NEIGHBOUR IN DOCUMENT USING KEYWORDS
MEERA SUGUNAN
15 ANBARASI K CIPHER XRAY: EXPOSING CRYPTOGRAPHIC OPERATIONS AND TRANSIENT SECRETS FROM MONITORED BINARY EXECUTION
ARUL MOZHI P
DEIVA PRIYA R
16 DAYANA THOMAS CROSS LAYER APPROACH FOR MINIMIZING ROUTING DISRUPTION IN IP NETWORKS
PRIYA A
17 ELAMATHI P SECURITY BASED DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR NETWORK
MANISHA B
NANDHINI DEVI A
SUSIRTHA R

ACADEMIC YEAR: 2013-2014

S.No. STUDENTS NAME PROJECT TITLE
1 BARANI E USER ACCESS POLICY CONTROL AND CONTENT STORAGE IN CLOUD
ARAVINDHAN S
KARTHICK RAJA L
SARAVANAN R
2 AMAL KURIAN TIME SYNCHRONIZATION BASED ON SLOW FLOODING IN WIRELESS NETWORKS
ASWATHDEV P.S
ABHIJITH N RAJ
3 BALU T MULTIVIEW PARTITIONING VIA TENSOR METHODS
GANESH MOORTHY J
NATARAJAN C
KATHIRAVAN S
4. KARTHICK S BUILDING A WEB BASED TOOL FOR TRACKING, REPORTING AND ANALYSING THE DATA-DRIVEN INSIGHTS
MILTON MERCIER R
5 SATHEESH K BAHG: BACK BONE HOP ASSISTED HOP GREEDY ROUTING FOR VANET’S CITY ENVIRONMENTS
VINOTHKUMAR S
6 ARUNA A REDUNDANCY MANAGEMENT MULTIPATH ROUTING FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS
DIVYA G
KIRUTHIKA B
7 AMUTHA A PERCEPTUAL VIDEO CODING ON THE SSIM-INSPIRED DIVISIVE NORMALIZATION SCHEME
KAYALVIZHI G
AMSAVALLI M
GAYATHRI G
8 AMRITHASREE V.S RANKING CLOUD SERVICES BY USING QOS VALUES
AMSAVALLI P
ANGELA JOSEPH
CHIPPY SATHYAN
9 NARAYANI DEVI R DATA MINING WITH BIG DATA
10 ANCINA REXY A PRIVACY PRESERVING BACK PROPAGATION NEURAL NETWORK LEARING MADE PRATICA IN CLOUD COMPUTING
MAHALAKSHMI S
KANAGAM K
MALATHI A
11 VANITHA.G JOINT INTERFERENCE COORDINATION & LOAD BALANCING FOR OFDMA MULTINOP CELLULAR NETWORS
ANITHA M
MEENA.E
13 ATUL THAPA VAMPIRE ATTULES DRAINING LIFE FROM WIRELESS AHOC SENSOR NETWORK
GOKUL G MENON
ASWIN U K
JAGADEESH KUMAR AG
14 RAMAKRISHNAN N DISCOVERING THE EMERGING TOPICS IN SOCIAL STREAM USING LINK ANOMALY DETECTION
NEPOLEAN BONAPART SELVARAJ
NATARAJAN R
PANDI RAJAN K
15 ABDUL BASITH A VIDEO DISSEMINATION OVER HYBRID CELLULAR AND ADHOC NETWORKS
JEGAN.R
S.MARIMUTHU
MOHANRAJ R
16 NATARAJAN M AN IMPROVED AUTHENTICATED GROUP KEY TRANSFER PROTOCOL BASED ON SECRET SHARING
RAMESH R
VIJAYAN S
SARAVANAKUMAR A
17 NATARAJAN G LARGE SCALE SYNTHETIC SOCIAL MOBILE NETWORKS WITH SWIM
SABARINATHAN R
SIVAKUMAR S
RANJITH KUMAR R
18 SANDEEP SASHI ENERGY EFFICIENT OPPURTUNISTIC ROUTING
PAULRAJ S
19 PAUL INICO MARY P OPTIMAL DISTRIBUTED MALWARE DEFENSE IN HETEROGENEOUS MOBILE DEVICES
RAJALAKSHMI R
SINTHIYA S
20 UMAMAHESWARI P WARNING BIRD: DETECTION OF SUSPICIOUS URLS IN SOCIAL NETWORKS
TAMILARASI L
SHOBANA R
21 SARANYA B SECURING DISTRUPTION TOLERANT NETWORK FROM PACKET AND REPLICATION FLOOD ATTACK
SARANYA MARY L
NIVETHA K
22 SATHYA PRIYA R A SELF ORGANIZATION TRUST MODEL FOR PEER TO PEER SYSTEM
SHARMILA R
KEERTHIGA K
23 PRABHA A FAKE PERSON DETECTION USING FACE FINGERPRINTS AND IRIS BIOMETRICS
RAMYA S
RANI V
SUBA B
24 SUDHA VIOLET R VIDEO COMPRESSION WITH DATA HIDING AND DATA ENCRYPTION
VANMIKA R
VELVIZHI P
VENNILA L
26 RINTO R JOHN AUTHORIZATION CONTROL FOR SEMATIC DATA IN SEARCH ENGINE
RUTHIN RAG K P
MUNEER MUHAMMED

ACADEMIC YEAR: 2012-2013

S.No. STUDENTS NAME PROJECT TITLE
1 MURALIKUMAR.S ROBUST WATER MARKING VIA CLUSTERING AND ENHANCE PIXEL-WISE MASKING
NAVEENRAJ.C
PARTHIB AN.A
SIVANANTHAM.M
2 ARUN KUMAR.D SLICING: A-NEW APPROACH FOR PRESERVING PRIVACY DATA PUBLISHING
AHAMED.M
SILAMBARASAN.G
PALANIVEL.D
3 NEHRU.L JS-REDUCE: DEFENDING SEQUENTIAL  BACKGROUND  KNOWLEDGE ATTACK
RAMAJAYAM.R
RAJESH.N
4 MOHAMED SIDHIK.S.M JAMMING RESILENT MULTIPATH ROUTING
RIYAJ AHAMED.M.Y
MANIKANDAN.S
KANNUSAMY.M
5 PRASANNA KUMAR.J MULTISTEP SIMILARITY RECORD SEARCHING FROM MULTIPLE WEB DATABASE
SATHISH AYYAPPAN.A
MURUGAN.S
6 SATHISH KUMAR.G HANDLING MULTIPLE FAILURING IP NETWORK(LOLS)
BARANITHARAN.K
DHEENADAYALAN.R
7 BHUVANESH.E JOINT TOP-K SPATIAN KEYWORD QUERY PROCESSING
MANIKANDAN.R
PRABAKARAN.M
8 SUBA.S DETECTION  AND LOCALIZATION OF MULTIPLE SPOOFING IN WIRELESS NETWORKS
SOWMIYA.B
KOKILA.K
9 SARANYA.S CLOUD COMPUTING SECURITY FROM SINGLE TO MULTIPLE CLOUD
PRIYA.T
INDHIRAGANDHI.K
10 ANANAD.M EMINENT WITH PROTECTED SHARING OF PERSONAL HEAITH RECORDS IN CLOUD COMPUTING
SHYAM SAJAN
11 SUMATHI.B EXPANDING SERVICE CAPACITIES AND INCREASING SERVICE RELIABILITY FOR THE GRID BASED UTILITY CONCEPTS
12 RAMYA.V CROSS LAYER OPTIMIZATION CORRELATED DATA GATHERING IN WIRELESS SENSORS NETWORK
SURIYA.P
13 ASWATHY BABY A DYNAMIC TRUST COMPUTATION MODEL SECURED FOR COMMUNICATION IN MULTI-AGENT SYSTEM
NAHEELA.K.C
PARVEENBANU.S
14 JEYANTHI.P USING CONCEPT OF NYMBLE-BLOCKING MISBEHAVING USERS IN ANONYMOUS NETWORK
JEEVITHA.S
15 KALAIVANI.B RESTORING INTERNODE CONNECTIVITY USING RIM  ALGORITHM
SURYA.G
16 PARTHIBAN.M PRESERVING LOCATION PRIVACY FROM BOTTLENECK AREA IN WIRELESS SENSOR NETWORKS
PRASATH.P
17 SELVAKUMAR.R INTEGRITY VERIFICATION IN MULTI-CLOUD STORAGE
VELUSAMY.K
VIGNESH.S
18 RAJA.M SECURE OVERLAY ACCESS CONTROL IN CLOUD COMPUTING
SURESH.C
SATHYARAJ.K
19 GUNASEELAN.R MINING SOCIAL EMOTION FROM AFFECTIVE TEXT
PREMKUMAR.M
RANJITHKUMAR.R
20 SANTHANARAJ.S A PERFORMANCE ANOMALY DETECTION AND ANALYSIS FRAMEWORK FOR DBMS DEVELOPMENT
MANSOOR ALI.S
ALLWINSANTHOSH

ACADEMIC YEAR: 2011-2012

S.No. STUDENTS NAME PROJECT TITLE
1 A.ABDUL KADHAR AN EFFECTIVE PRIVACY PROTECTION SCHEME FOR CLOUD COMPUTING.
AMALA ARIVARASAN.E
EURUVARAM SANDEEP KUMAR REDDY
DEVASUNDARAM.K
2 SRUTHI SREEDHARAN RITAS: SERVICES FOR RANDOMIZED INTRUSION TOLERANCE.
VIJISHMA.O.T
S.SARANYA
3 LAKSHMANAN.S STATE MONITORING IN CLOUD DATA CENTER.
KARTHICK.M
KARTHIK.R
KATHIRAVAN.A
4 S.GAUTHAM ROBUST CORRELATION OF ENCRYPTED ATTACK TRAFFIC THROUGH STEPPING STONE FLOW WATERMARKING.
R.J.ARULSELVAN
N.BALASUBRAMANI
5 S.DINESH PRIVACY PRESERVING MULTI KEYBOARD RANKED SEARCH OVER ENCRYPTED CLOUD DATA.
A.ATHAVAN
G.PARTHIBAN
6 RIYA MATHEW GENERALIZED PROBABILISTIC FLOODING IN UNSTRUCTURED P2P NETWORKS.
THULASI VIJAYAN
RINI MOL
7 M.THIRUNAVUKKARASU AN APPROACH TO DETECT AND PREVENT SQL INJECTION ATTACKS IN DATABASE USING WEB SERVICE.
K.RAJESH
M.VIVEK
8 BENSON JOSEPH CLOUD COMPUTING SOLUTION FOR PATIENT’S DATA COLLECTION IN HEALTH CENTER ’S INSTITUTION.
NAHAS.P.NASAR
SHIRON KURIAN
SAJAD.P.S
9 NIGEL RODRICKS PINTO DATA LEAKAGE DETECTION.
N.NEELRAJ
M.ARCHUN
10 S.HAREESH PRIVACY PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING.
A.PRABHUL
P.K.ARUN
K.SAJAD
11 G.RAMESH SELF ORGANISATION AGENT FOR SERVICE IN COMPOSITION IN CLOUD COMPUTING.
V.VEERAPANDIYAN
R.DEIVAKKODI
B.SIVAANAND
12 E.MALLIKA THE GEOMETRIC EFFICIENT MATCHING ALGORITHM FOR FIREWALLS.
K.NITHIYA
R.MAHALAZMI
A.FARVEEN BANU
13 M.PRABATH BALANCING REVOCATION STORAGE TRADE-OFF IN SECURE GROUP COMMUNICATION
M.VIGNESH
A.VAIRAMOORTHY
14 M.SAHAYA DEEPAN RAJ INTEGRATION OF SOUND SIGNATURE IN GRAPHICAL PASSWORD AUTHENTICATION SYSTEM.
M.RAYADURAI
L.RAJKAMAL
T.RATHINAM
15 D.DIVIYA BHARATHY A DUAL FRAMEWORK AND ALGORITHM FOR TARGETED ONLINE DATA DELIVERY.
A.AKILANDESWARI
K.MALA
M.B.ASWATHY
16 T.SAKTHIVEL DATA HIDING IN MOTION VECTORS OF COMPRESSED VIDEO BASED ON THEIR ASSOCIATED PREDICTION ERROR
V..MADHAN
C.RAGUNATH
G.GOBINATH
17 S.VETRIVEL EXPLORING APPLICATION LEVEL SEMANTICS FOR DATA COMPRESSION.
K.VARADHARAJ
GOWRISHANKAR


PG PROJECTS

Academic Year : 2015-2016

S.No. STUDENTS NAME PROJECT TITLE
1 P.AMBIGA Energy Saving in Disk Storage using Regilication Stratergy
2 R.ARCHANA Resource Provisioning Framework for Analyze the Hybrid Cloud
3 R.BHAGYA Mobile Educational Learning using QR Based U-Learning for Personalized Tutoring
4 S.GOMATHI A File Sharing System in P2P Network using Social Trust
5 N.MAHESHWARI Reducing the Rekeying Problem in Multiple Multicast Groups using Session Key
6 D.PANIMALAR Detection and Correction of Malicious Data Injection in Event Detection wireless Sensor Networks
7 N.PRIYA A Novel Approach for Energy saving in wireless Sensor networks using Sleep Scheduling Technique
8 N.SARANGAN Enabling Efficient Multi Keyword Ranked Search Over Encrypted Cloud Data through Blind Storage
9 S.SARANYA Protecting the Sharing Data in the Cloud using Encryption Technique
10 B.SUBA Providing Authentication for Sub Graph Similarity Search in Outsourced Graph Databases
11 A.TAMILMOZHI An Analysis of social Network using Socialite
12 B.THAMOTHARAN Reducing Operational Costs in Cloud Social T.V

Academic Year: 2014-2015

S.No. STUDENTS NAME PROJECT TITLE
1 BAKKIYARAJ.G Automatic Robust object recognition and sequence from multi-video streaming
2 DINESH.V Gradient histogram estimation and preservation for texture enhanced image de noising
3 ELAVARASI.E Allocating resources in cloud using scheduling
4 JANCY RANI.S The accuracy updated ensemble algorithm reacted to different types of concept drift
5 JOTHI.G A Novel SII propagation modeling on E-Mail based malware using virtual nodes
6 KOKLIA.K Portioning workloads in co-optimizing locality and utility using algorithm load balancing
7 PRAVEENA.J An energy saving and resources devoting in cellular networks
8 SHANTHIPRIYA.R GHT trust management in unattended wireless sensor network
9 SOWMIYA.B Analysis of the depth field rendering and image refocusing using genetic algorithm
10 SUBA.S Hybrid vehicular based multiple-hop co-operative video streaming using pipeline forward
11 SUJITHA.S Generating keys for authentication in SMSL layer using internet
12 VASANTHI.S Allocating and sharing infrastructure resource using GATA in cloud via social network
13 VIGNESWARI.D Adaptive wavelet based compression and representation  using canonical correlation algorithm

Academic Year: 2013-2014

S.No. STUDENTS NAME PROJECT TITLE
1 S.GANESH MANI A MIMO BASED TRANSMISSION OF DATA AND ENERGY IN WIRELESS BROADCASTING SYSTEM
2 K.GUNA ENERGETIC RESOURCE ALLOCATION FRAMEWORK USING VIRTUALIZATION IN CLOUD
3 N.KALPANA DATAMINING TECHNIQUES FOR PREDICTING SCHOOL FAILURE AND DROPOUT
4 P.LAKSHMI NARASIMMAN NATURAL LANGUAGE SEARCH,A FUNCTIONAL APPROACH
5 J.MAANVIZHI DEPTH VIDEO COMPRESSION USING WEIGHTED MODE FILTERING
6 E.MALLIKA JOINT VIDEO COMPRESSION AND ENCRYPTION USING SECURE WAVELET TRANSFORM AND ENTROPY CODING
7 MARY MICHEAL DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING
8 S.PRIYA DETECTING AND LOCALIZING WIRELESS SPOOFING ATTACKS
9 K.RAJALAKSHMI PRIVACY PRESERVING FRAMEWORK FOR PROTECTING SENSITIVE LABELS IN PARTICIPATORY SENSING
10 R.RAMACHANDRAN A NOVEL APPROACH IN CBIR  BASED ON SCALE INVARIANT DESCRIPTORS AND MULTISORT INDEXING
11 M. RANJITH PRIYANKA A WIRELESS MESH NETWORKS WITH RELIABLE AND RESILIENT ROUTING BY CROSS-LAYER METRICS
12 B.RENUGADEVI SOURCE ANONYMOUS MESSAGE AUTHENTICATION BASED ON ECC IN WIRELESS SENSOR NETWORKS
13 R. SARAVANAN DATA STREAM MINING USING DECISION TREE ALGORITHMS
15 S. SENBAGAVALLI A   SECURE PERVASIVE HEALTH SYSTEM FOR MOBILE HEALTHCARE EMERGENCY
16 M. SHARMILA CLOUD-BASED MOBILE STREAMING USING QOS APPROACH
17 S. VIDHYA A SECURE PROTOCOL FOR SPONTANEOUS WIRELESS ADHOC NETWORKS CREATION
18 S. VIDHYA BHARATHI IMAGE BINARIZATION TECHNIQUE FOR DEGRADED COLOUR DOCUMENT IMAGES

Academic Year : 2012-2013

S.No. STUDENTS NAME PROJECT TITLE
1 S.ANDREWS DESIGN AND IMPLEMENTATION OF TARF: A TRUST-AWARE ROUTING FRAMEWORK FOR WSNS
2 M.ANITHA CLOUD INFORMATION ACCOUNTABILITY FRAME WORK FOR DATA SHARING
3 G.EBENEZER CONFIDENTIALITY OF ENCRYPTED SPEECH COMMUNICATIONS
4 J.R.GAYATHRI DEVI SIMILARITY  SEARCHING ON FLEXIBLE HASHING TECHNIQUE
5 A.JAYAVEERAN UN OBSERVABLE INFORMATION FLOW INTEGRITY VERIFICATION USING REMOTE ATTESTATION METHODOLOGY
6 S.KAVIRAJ SINGLE SIGN ON USING MULTIPLE SERVICE
7 V.KRISHNAVENI 3D VIDEO UNDERSTANDING BY USING TOPOLOGY DICITIONARY
8 K.S.PARANI IMAGE ACQUISTION FOR MOTION BLUR FREE HDR IMAGES FROM MULTIPLE IMAGE SHOTS
9 V.RAJALAKSHMI A PROTECTED CODE BASED CLOUD STORAGE SYSTEM WITH SECURE INFORMATION FORWARDING
10 M.RAJESH KUMAR CATCHING PACKET DROPPERS AND MODIFIERS IN WIRELESS SENSOR NETWORKS
11 V.RAJESH DESIGN OF AN INTEGRATED ATM BANKING SYSTEM THROUGH IRIS RECOGNITION
12 A.REVATHI ON ROUTE LIFE TIME AND ENERGY AWARE ROUTING PROTOCOL IN MULTI HOP MOBILE ADHOC NETWORK
13 R.SANKAR SECURE RANKED KEYWORD SEARCH
14 G.SIVARAJ DEFENSIVE LOCALITY ISOLATION IN SENSOR NETWORKS AGAINST A WORLDWIDE EAVESDROPPER
15 K.UMAMAHESWARI FINE GRAINED LATENCY MEASUREMENT USING LOSSY DIFFERENCE AGGREGATOR
16 S.VIDHYA PERFORMANCE EVALUATION OF FINITE –GAIN AND SCALABLE-GAIN BACKOFF MISBEHAVING NODES IN WIRELESS NETWORK

ACADEMIC YEAR : 2011 - 2012

S.No. STUDENTS NAME PROJECT TITLE
1 R.K.ANANTHI AN AGGREGATE LOCATION MONITORING SYSTEM FOR WIRELESS SENSOR NETWORKS
2 P.GAUTHAMI ACHIEVING SECURITY AND PERFORMANCE OVER CLOUD COMPUTING USING LINEAR PROGRAMMING
3 V.GOKULAKRISHNAN AUTHENTICATED MULTISTEP NEAREST NEIGHBOR SEARCH IN DATA MINING
4 S.JENIFER PRIVACY PRESERVATION AGAINST TRAFFIC ANALYSIS USING RANDOM NETWORK CODING IN MULTI-HOP WIRELESS NETWORK
5 S.KARTHIKA SATEM BASED POLICY ENFORCEMENT IN MANET
6 M.KAVITHA RUMOR RIDING IN  PEER TO PEER NETWORK
7 M.MAHESWARI RECOVERING FROM DDOS ATTACK USING ENTROPHY VARIATION
8 K.NITHYA AN EFFICENT AUTHENDICATION PRESERVING SECURITY AND PRIVACY IN DISTRIBUTED SYSTEM USING THREE FACTOR AUTHENTICATION
9 P.NITHYA MULTICAST POWER EFFICIENT ROUTING IN ADHOC NETWORKS
10 M.PARVATHI INTRUSION DETECTION : PREVENT CODE INJECTION ATTACKS IN RUNTIME
11 T.PRIYADHARSINI COLLABORATIVE ENFORCEMENT OF FIREWALL POLICES IN VIRTUAL PRIVATE NETWORKS
12 M.RAJMOHAN AN EFFICENT COLLISION AVOIDANCE TIME SLOT ALLOCATION PROTOCOL FOR WIRELESS SENSOR NETWORKS
13 S.REKHA EFFICIENT MULTICAST PACKET AUTHENTICATION BASED ON BATCH SIGNATURE
14 P.SARANYA SECURE AND DYNAMIC CLOUD COMPUTING
15 J.E.TEPPILLA A BUSINESS MODEL FOR CLOUD COMPUTING WITH CACHING NOTION
16 K.VIJAYALAKSHMI HIGH ORDER EDGE DIRECTED INTERPOLATION FOR DATA PRUNING BASED COMPRESSION
 
 
     
 
Copyright © Roever Group of Insitutions, Perambalur Powered by AGASOFT