A+ A A-
  • Written by akila
  • Hits: 2585

INTELECTIUM ’10 – EVENTS REPORT OF INFORMATION TECHNOLOGY

 

INTELECTIUM ’10 – EVENTS REPORT OF

INFORMATION TECHNOLOGY

 

The function started with the Welcome Address  given by Ms. S.Akila Devi, Head of the Department of Information Technology. The Chief-Guest for the function was Mr. M. Dhanasekar, Chief Executive Officer, Adodis Technologies (P) Ltd. Bangalore. In his address he said that students must develop their Communication and Soft- Skills along with the updation of the technical knowledge. He also said that Pro-Activeness and Commitment are the mantras of success. The students should also work hard to meet out the expectations of the industry. They should become a trend setter rather than a follower. After that the Dean of the college Mr. M. Palanikumar addressed the gathering and appreciated the hard work of the staff and the students for organising this symposium. He also thanked the guests for their kind gesture to attend the function. In the afternoon, competitions like Paper Presentation, Project Display,Tech-Quiz,Debugging and Web-Designing were held. The Chair-Person Dr. D. Loganathan, Professor-Information Security, Department of CSE, Pondicherry Engineering College, Puducherry judged Paper Presentation.  

EVENT I-PAPER PRESENTATION

WINNERS

I PRIZE:

             

           AUTHOR: Vignesh Pandurangan

                             Thiyagarajar College Of Engineering,

            TITLE- Traceback at router with improvised authentication

             

ABSTRACT:-Distributed denial of service attacks (DDoS) currently represent a serious threat to appropriate operation of Internet services. To deal with this threat an IP- traceback scheme is available that forms an overlay network at the level of autonomous systems. This model doesn’t require a priori knowledge of the network topology and allows single-packet traceback and incremental deployment. This model currently traces back to the autonomous system but not to individual system which is left as future work. The problem with this model is that an attacker who has made a zombie attack and has taken control of innocent hosts or an attacker with a spoofed IP address leaves no trace of him. In order to identify the original source of the attack, first we create a router level traceback that helps in identifying the source of the attack more accurately, second we suggest an authentication system that uses elliptical curve digital signatures for authenticating the packets getting out of the system that has this model deployed. As an extension and as a solution to the above said problem we propose our system with router level traceback and improvised authentication.

 

II PRIZE:

 

                 AUTHOR       :   R.Ramalakshmi,

                                           Sethu Institute Of Technology

               

TITLE     :   Network Security Using ASP.NET

 

    ABSTRACT:   In this current world where everything is moving online like booking tickets, online banking. It becomes mandatory for us to make this transaction more secure without chances of intruders hacking the information. Day by Day the application moving online is increasing and at the similar rate the issues relating to intruding of credentials has also increased. So it has become so vital that the transactions should take place in a protected ambience without any possibility of Stealing the information. Imagine the disaster that would result if some credential information about the users gets hacked in an online banking.

PARTICIPATORY PRIZE:

                  1.AUTHOR       : P.KalaiSelvam

                                               Sakthi Mariamman Engineering College,

       TITLE    :     IDPF TECHNIQUE TO PREVENT IP SPOOFING

          ABSTRACT:  The Distributed Denial-of-Service (DDoS) attack is a serious threat to the legitimate use of the Internet. Prevention mechanisms are thwarted by the ability of attackers to forge or spoof the source addresses in IP packets. By employing IP spoofing, attackers can evade detection and put a substantial burden on the destination network for policing attack packets. In this paper, we propose an interdomain packet filter (IDPF) architecture that can mitigate the level of IP spoofing on the Internet. A key feature of our scheme is that it does not require global routing information.

IDPFs are constructed from the information implicit in Border Gateway Protocol (BGP) route updates and are deployed in network border routers. We establish the conditions under which the IDPF framework correctly works in that it does not discard packets with valid source addresses. Based on extensive simulation studies, we show that, even with partial employment on the Internet, IDPFs can proactively limit the spoofing capability of attackers. In addition, they can help localize the origin of an attack packet to a small number of candidate networks.

 

2. AUTHOR:    AbinayaLakshmi.E and Aishwarya Laksmi.M,

                           Thiyagarajer College Of Engineering,

                            Madurai.

 

TITLE          :    AGROBATS

             

                ABSTACT This paper contains a description of the echanical design route that was adopted  in building a small Agriculture Robot. At the outset, we decided to follow a set of guidelines that defined a broad set of specifications that featured safety, low weight, small length, large mission time, easy-to-use, application specific, and most importantly low cost. The paper will address the most important design issues, lessons learned, and problems that remain for further development.

 

EVENT II-PROJECT DISPLAY

 

BEST PRIZE :  E.Abinaya Laksmi , M.Aishwarya Lakshmi , P.Mohana Priya

                Thiyagarajar College Of Engineering.

 

TITLE   : Graph Simulator

 

ABSTRACT

                           Graph simulator is designed using C language and interfacing is done using graphics in C.

 

 

This software can simulate the curve aX^2+bY^2+cX+dY=e and more generalized forms of curves such as parabola, hyperbola etc.Depending on the values of a,b,c,d,e  it can draw ellipse, circle, parabola, hyperbola, straight line etc.The user can change the scale of X-axis or Y-axis during run time.The user can also amplify the curve and can get the more detailed shape of the curveThe user can also be able to shift the entire graph either left, right, top, or bottom in the screen so that the user is able to see where the curve goes and where it exactly cuts the X or Y axis.The user can able to see the values of points traced out by the curve. This feature enables the user to know the exact points of  X and Y axis traced out by the curve and the points where it cuts the X or Y axis.Options are also included to draw more generalized forms of curves like (Y+a) ^2=c(X+b) etc.Effective user interface is included and the user can retrieve all the information about the curve in the screen.Just by giving the values of a,b,c,d,e the user can know what type of curve it is and all the necessary information about the curve without knowing anything about the curve.The graph simulator is designed without using any inbuilt functions in graphics library such as ellipse(),circle() etc.

 

EVENT III- TECHNICAL QUIZ

 

WINNERS

 

                                   I PRIZE:     L.Vadivel Murugan & A.Lithiya

                                                                   Pandian Saraswathy Yadava Engg. College

                                   II PRIZE:    R.Sathish Kumar   &  R.Harish

                                                                   Thiyagarajar College Of Engineering.

 

 

 

 

 

EVENT IV- DEDUGGING

  

WINNERS

 

                                         I PRIZE:   Kiruthiya.B & M.Sumathy

                                                          Pannai College Of Engineering.  

                                         II PRIZE: G.Essaki Rani

                                                              National Engineering College 

                                                                             &

                                                                  R.Ramalakshmi

                                                            Sethu Institute Of Technology

 

 

EVENT V- WEB DESIGNING

 

WINNERS

                                                I PRIZE:   S.Rohini & K.Indumathy

                                                            Thiyagarajar College Of Engineering

                                      II PRIZE: N.Uma & S.S.Abilasha

                                                      Thiyagarajar College Of Engineering.

 

 

 

 

 

 

 

 

 

 

We have 30 guests and no members online