Computer Science and Engineering Research Centre - ICON –Intelligent systems and Computer Networking

Research Environment

PEC’s research laboratory, with the state of the art technology, creates an ambient and pulsating environment for innovative and proactive research. Research is being carried out by individual research groups and interdisciplinary project teams and capable of managing large scale assignments. The conglomerate of high level researchers creates a great opportunity for need based collaboration. The main objective of the R&D activities in the college is to foster the research attitude and impart the research based teaching practices in the campus. The vibrant research environment, aided by dynamic research administration, gives thrust for creative ideas and prepares the young researchers to delve into their areas of interest. PEC has made dedicated efforts to align its R&D focus to achieve technological self-sufficiency. A lot of Research and development milestone and accomplishments has been achieved and we aim to strive for excellence in academic research and engineering development.


Faculty & Research

The teaching faculty is given absolute freedom to involve in newer and result oriented research and disseminate their knowledge to aspiring researchers. The faculty is encouraged to publish their findings and articles in peer reviewed research journals. The fruitful discussion and meaningful interaction with the young research group benefit the faculty to enhance their knowledge and their capability to carry out challenging research. The major task in tutoring engineering is deeply to connect the students with the subject which makes it totally challenging without the proper connectivity of the latest technology with the regular academic course. To overcome this challenge, the faculty members who are involved in teaching various technology based courses are active researchers. The dedicated faculty and researchers forms the fulcrum of successful research at PEC. This provides a highly conductive and stimulating environment for the young brains to explore and come out with innovative solutions using emerging technologies.


Students & Research

"Research is formalized curiosity. It is poking and prying with a purpose." PEC inculcates the knowledge based learning to the students to hone their thinking abilities and skill sets and prepare them for higher research. PEC provides excellent infrastructure facilities and world class education which enables the students to participate in quality research and make them adapt to emerging opportunities for new technologies. The Students are highly motivated to perform their research activities in the emerging trends in the field of Computer Science and Engineering and submit proposals to various funding agencies. PEC provides all the facilities to the students regards to learn the newer technology and enhance their skills by giving them the needed assistance .


Major Research Area

Big Data

Big Data refers to all the data that is being generated across the globe at an unprecedented rate. This data could be either structured or unstructured. The tools used to store and analyze Big Data are Hadoop, Hive, HBase, Sqoop, Pig etc. Dealing with big data is more than just dealing with large volumes of stored information. Volume is just one of the many V's of big data that organizations need to address. There usually is also a significant variety of data from structured information sitting in databases distributed throughout the organization to vast quantities of unstructured and semi structured data residing in files, images, videos, sensors, system logs, text and documents, including paper ones that are waiting to be digitized. Distributedprocessing technologies, especially those promoted by open source platforms such as Hadoop and Spark, enable organizations to process petabytes of information at rapid speed.


Cloud Computing

Cloud Computing has provided Big Data with a way to store and retrieve massive amount of information. It has evolved from personal cloud storage to entire organizations moving all of their data to the cloud. Cloud computing is one of the main technologies driving the way we work and play. The cloud refers to web-connected servers and software that users can access and use over the internet. As a result, its not needed to host and manage your own hardware and software. It also means that we could access these systems anywhere that have access to the internet.We come across cloud computing every day. When you check the Gmail inbox, look at a picture on your Dropbox account, or watch favourite shows on Netflix, we access information that is located on a server somewhere in the world. Those emails, video files, or whatever else that is needed are not being stored on any computer, but could access them quickly, easily, and cheaply due to modern cloud computing technology.


Internet of Things

The Internet of Things represents a vision in which the Internet extends into a real world embracing everyday objects. The Physical items are no longer disconnected from the virtual world, but they can be controlled remotely and also serve as physical access points to Internet services. IoT uses a variety of technologies to connect the digital and physical worlds. Physical objects can be embedded with sensors and actuators. Sensors monitor things like temperature or motion, or really any change in environment. Actuators receive signals from sensors and then react to the reported changes. Sensors and actuators communicate with computing systems via wired (for example, Ethernet) or wireless (for example, Wi-Fi or cellular) networks; these computers can monitor or manage the health and actions of connected objects and machines. The constant connectivity that IoT enables, combined with data and analytics, provides new opportunities to innovate products and services, as well as to increase operational efficiency.


Network Security

With the as worldwide systems extend the interconnection of universal information network, the smooth activity of communication and computing arrangements becomes vital. However, repeating attacks as virus and worm assaults and the achievement of criminal assailants delineate the shortcoming in current data advances and the need to give increased security in the network. Network Security protects your network and data from breaches, intrusions and other threats. This is a vast and overarching term that describes hardware and software solutions as well as processes or rules and configurations relating to network use, accessibility, and overall threat protection. Network Security involves access control, virus and antivirus software, application security, network analytics, types of network-related security (endpoint, web, wireless), firewalls, VPN encryption and more. Network Security the process of creating a strategic defensive approach that secures a company’s data and its resources across its network.


Image Processing and Pattern Recognition through Computer Vision

The advancements in digital technologies in Computer Vision had led to the abundance of Image datasets, various Image processing techniques to understand and deal with complex problems and challenges in adverse conditions in the image acquisition process, occlusion, objects with complicate shapes, with topological variations or undergoing complex motions. Pattern recognition analyzes incoming data and tries to identify patterns. The identification of regularities in data can then be used to make predictions, categorize information, and improve decision-making processes. At the heart of a pattern recognition system are computer algorithms that are designed to analyze and interpret data. The data inputs can be words or texts, images, or audio files. Hence, pattern recognition is broader compared to computer vision which focuses on image recognition.

For Admissions

Bangalore Trunk Road, Varadharajapuram, Poonamallee, Chennai – 600 123.

+91-90438 91272 / 90438 90983

044 -26490404 / 0505 / 0717

info@panimalar.ac.in