The Information Technology Department is at the forefront of technological innovation and digital transformation. Established in 2023, the department aims to provide a robust platform for students to excel in IT, one of the fastest-growing sectors globally. With an intake of 60 students for the academic year 2023, the department has quickly become a hub for technological education, focusing on empowering students with the skills needed to meet the demands of the ever-evolving tech landscape.
Why Information Technology?Information Technology is the backbone of today's digital world, encompassing a wide range of fields, including software development, network management, cybersecurity, artificial intelligence, and data analytics. It involves the study and application of computing technologies to solve problems and improve processes across various industries. In addition to technical skills, IT professionals are expected to adapt to new trends and technologies rapidly, making it a highly dynamic and exciting career path.
Career Opportunities in Information Technology:Candidates must have completed the 10+2 system of Education with a pass in Physics, Chemistry, and Mathematics in the qualifying examinations.
Scope for Higher Studies:The Department of Information Technology is committed to producing professionals capable of designing, implementing, and managing cutting-edge technological solutions that meet the needs of industries and improve the lives of people worldwide.
To be a leading department in the field of Information Technology.
To provide exceptional education and foster innovation.
To produce competent and ethical professionals who contribute to technological advancement and societal progress.
Mission:To provide students with a comprehensive education in Information Technology.
To equip students with the necessary knowledge and skills to excel in a global technology-driven environment.
To develop technical expertise in core IT disciplines like software engineering, systems analysis, and networking.
To promote critical thinking and problem-solving abilities among students.
To foster a culture of research and innovation to address the evolving challenges in the IT industry.
To instil professional values and ethical responsibility, ensuring graduates make positive contributions to both the IT field and the community.
Graduates will be able to:
Demonstrate technical competence with analytical and critical thinking to understand and meet the diversified requirements of industry, academia, and research.
Exhibit technical leadership, team skills, and entrepreneurship skills to provide business solutions to real-world problems.
Work in multi-disciplinary industries with social and environmental responsibility, work ethics, and adaptability to address complex engineering and social problems.
Pursue lifelong learning, use cutting-edge technologies, and engage in applied research to design optimal solutions.
Program Outcomes (POs):Engineering Knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and an engineering specialization to solve complex engineering problems.
Problem Analysis: Identify, formulate, review research literature, and analyze complex engineering problems, reaching substantiated conclusions using first principles of mathematics, natural sciences, and engineering sciences.
Design/Development of Solutions: Design solutions for complex engineering problems and design system components or processes that meet the specified needs with appropriate consideration for public health and safety, as well as cultural, societal, and environmental considerations.
Conduct Investigations of Complex Problems: Use research-based knowledge and research methods, including the design of experiments, analysis and interpretation of data, and synthesis of information to provide valid conclusions.
Modern Tool Usage: Create, select, and apply appropriate techniques, resources, and modern engineering and IT tools, including prediction and modeling, to complex engineering activities with an understanding of their limitations.
The Engineer and Society: Apply reasoning informed by contextual knowledge to assess societal, health, safety, legal, and cultural issues, and the consequent responsibilities relevant to professional engineering practice.
Environment and Sustainability: Understand the impact of professional engineering solutions in societal and environmental contexts, and demonstrate the knowledge of, and need for, sustainable development.
Ethics: Apply ethical principles and commit to professional ethics, responsibilities, and norms of engineering practice.
Individual and Team Work: Function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings.
Communication: Communicate effectively on complex engineering activities with the engineering community and society at large, such as comprehending and writing effective reports and design documentation, making effective presentations, and giving and receiving clear instructions.
Project Management and Finance: Demonstrate knowledge and understanding of engineering and management principles, applying these to one’s own work, as a member and leader in a team, to manage projects and in multidisciplinary environments.
Life-long Learning: Recognize the need for, and have the preparation and ability to engage in independent and life-long learning in the broadest context of technological change.
Information Technology (IT) is a vast field offering a wide range of career paths across industries. Here's an overview of key opportunities:
1.Software DevelopmentAssistant Professor/ HOD (AI&DS & IT)
B.Tech., M.E.,
ASSISTANT PROFESSOR
B.E., M.E.,
ASSISTANT PROFESSOR
B.TECH., M.E.,
ASSISTANT PROFESSOR
B.TECH., M.E.,
ASSISTANT PROFESSOR
B.E., M.E.,
ASSISTANT PROFESSOR
B.E., M.E.,
ASSISTANT PROFESSOR
S.No | Course Code | Course Title | Category | L | T | P | C | Credits | Semester |
---|---|---|---|---|---|---|---|---|---|
1. | GE3171 | Problem Solving and Python Programming Laboratory | ESC | 0 | 0 | 4 | 4 | 2 | Semester 1 |
2. | BS3171 | Physics and Chemistry Laboratory | BSC | 0 | 0 | 4 | 4 | 2 | Semester 1 |
3. | GE3172 | English Laboratory $ | EEC | 0 | 0 | 2 | 2 | 1 | Semester 1 |
4. | GE3271 | Engineering Practices Laboratory | ESC | 0 | 0 | 4 | 4 | 2 | Semester 2 |
5. | AD3271 | Data Structures Design Laboratory | PCC | 0 | 0 | 4 | 4 | 2 | Semester 2 |
6. | GE3272 | Communication Laboratory / Foreign Language $ | EEC | 0 | 0 | 4 | 4 | 2 | Semester 2 |
7. | AD3381 | Database Design and Management Laboratory | PCC | 0 | 0 | 3 | 3 | 1.5 | Semester 3 |
8. | AD3311 | Artificial Intelligence Laboratory | PCC | 0 | 0 | 3 | 3 | 1.5 | Semester 3 |
9. | GE3361 | Professional Development $ | EEC | 0 | 0 | 2 | 2 | 1 | Semester 3 |
10. | AD3411 | Data Science and Analytics Laboratory | PCC | 0 | 0 | 4 | 4 | 2 | Semester 4 |
11. | AD3461 | Machine Learning Laboratory | PCC | 0 | 0 | 4 | 4 | 2 | Semester 4 |
12. | AD3511 | Deep Learning Laboratory | PCC | 0 | 0 | 4 | 4 | 2 | Semester 5 |
13. | AD3512 | Summer Internship | EEC | 0 | 0 | 0 | 0 | 2 | Semester 5 |
S.No | Course Code | Course Title | Download Link |
---|---|---|---|
1. | IP3151 | Induction Programme | Click here |
2. | HS3152 | Professional English - I | Click here |
3. | MA3151 | Matrices and Calculus | Click here |
4. | PH3151 | Engineering Physics | Click here |
5. | CY3151 | Engineering Chemistry | Click here |
6. | GE3151 | Problem Solving and Python Programming | Click here |
7. | GE3152 | Heritage of Tamils | Click here |
8. | GE3171 | Problem Solving and Python Programming Laboratory | Click here |
9. | BS3171 | Physics and Chemistry Laboratory | Click here |
10. | GE3172 | English Laboratory | Click here |
11. | HS3252 | Professional English - II | Click here |
12. | MA3251 | Statistics and Numerical Methods | Click here |
13. | PH3256 | Physics for Information Science | Click here |
14. | MA3354 | Discrete Mathematics | Click here |
15. | CS3351 | Digital Principles and Computer Organization | Click here |
Title | Authors | Journal / Conference | Year |
---|---|---|---|
FPES-IDS: Forecast-Path and Exponential Smoothing-based Intrusion Detection System to Mitigate Blackhole Attack in RPL-based 6LoWPANs | VR Rajasekar, S Rajkumar | IEEE Access | 2025 |
Evaluating the impact of selective forwarding attacks on RPL-based 6LoWPAN in IoT: a comprehensive simulation study | VR Rajasekar, S Rajkumar | Computing 107 (3), 1-37 | 2025 |
A review of isolation attack mitigation mechanisms in RPL-Based 6LoWPAN of internet of things | VR Rajasekar, S Rajkumar | Computer Assisted Methods in Engineering and Science 31 (3) | 2024 |
DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN | VR Rajasekar, S Rajkumar | Cluster Computing 27 (9), 12029-12068 | 2024 |
A Study on Internet of Things Devices Vulnerabilities using Shodan | Rajasekar V R | International Journal of Computing 22 (2), 149-158 | 2023 |
Hybridized Cryptographic Encryption and Decryption Using Advanced Encryption Standard and Data Encryption Standard | A Kanshi, R Soundrapandiyan, VSA Sofia, VR Rajasekar | Cybernetics and Information Technologies 23 (4), 63-78 | 2023 |
Cloud Hosted Ensemble Learning-Based Rental Apartment Price Prediction Model Using Stacking Technique | S Rajkumar, L Ramanathan, VR Rajasekar, M Jantwal | Deep Learning Research Applications for Natural Language Processing, 229-238 | 2023 |
A Study on Impact of DIS flooding Attack on RPL-based 6LowPAN Network | VR Rajasekar, S Rajkumar | Microprocessors and Microsystems 94, 104675 | 2022 |
Analysis of Blackhole Attack in RPL-based 6LoWPAN Network: A Case Study | VR Rajasekar, S Rajkumar | 2021 28th IEEE Int’l Conf. on Electronics, Circuits, and Systems | 2021 |
An Efficient and Reliable Data Flow Protection Scheme to Improve the QoS in MPLS Network | VR Rajasekar | Int’l Journal of Innovation in Computational Science and Engineering | 2021 |
Adoption of Free and Open Source Software using Alternative Educational Framework in College of Applied Sciences | R Al-Hajri, G Al-Mukhaini, VR Rajasekar | arXiv:1702.05713 | 2017 |
Password-based Authentication in Computer Security: Why is it still there | S Mohammed, L Ramkumar, VR Rajasekar | SIJ Trans. Comput. Sci. Eng. Its Appl 5, 33-36 | 2017 |
The Need for Effective Information Security Awareness Practices in Oman Higher Educational Institutions | VR Rajasekar, S Khan, S Mohammed | arXiv:1602.06510 | 2016 |
Usage of Cloud Computing Simulators and Future Systems for Computational Research | R Lakshminarayanan, VR Rajasekar | arXiv:1605.00085 | 2016 |
Information Security Awareness at Oman Educational Institutions: An Academic Perspective | VR Rajasekar, R Lakshminarayanan, S Khan | arXiv:1605.05580 | 2016 |
Challenges in Transforming, Engaging and Improving M-Learning in Higher Educational Institutions: Oman Perspective | R Lakshminarayanan, VR Rajasekar, SK Shaik | arXiv:1504.01139 | 2015 |
A Review on Opportunities and Challenges in Implementing Free and Open Source Software in CAS | VR Rajasekar, Dr. Ramkumar Lakshiminarayan | 3rd Int’l Conf. of the Omani Society for Educational Tech. | 2015 |
The Need for Effective Information Security Awareness Practices in Oman Higher Educational Institutions | VR Rajasekar, Mr. Shimaz Khan | 1st Symposium on Communication, Info Tech, and Biotechnology | 2015 |
Multicasting of Images Resized Using Enhanced Seam Carving Technique in Hierarchical Group Communication | VR Rajasekar | Int’l Conf. on Network Computing and Information Security | 2012 |
Improved Authentication and Key Agreement Protocol Using Elliptic Curve Cryptography | A Chandrasekar, VR Rajasekar, V Vasudevan | Int’l Journal of Computer Science and Security 3 (4), 325-333 | 2009 |
Title | Authors | Journal / Conference | Year | Link |
---|---|---|---|---|
FPES-IDS: Forecast-Path and Exponential Smoothing-based Intrusion Detection System to Mitigate Blackhole Attack in RPL-based 6LoWPANs | VR Rajasekar, S Rajkumar | IEEE Access | 2025 | Click Here |
Evaluating the impact of selective forwarding attacks on RPL-based 6LoWPAN in IoT: a comprehensive simulation study | VR Rajasekar, S Rajkumar | Computing 107 (3), 1-37 | 2025 | Click Here |
A review of isolation attack mitigation mechanisms in RPL-Based 6LoWPAN of internet of things | VR Rajasekar, S Rajkumar | Computer Assisted Methods in Engineering and Science 31 (3) | 2024 | Click Here |
DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN | VR Rajasekar, S Rajkumar | Cluster Computing 27 (9), 12029-12068 | 2024 | Click Here |
A Study on Internet of Things Devices Vulnerabilities using Shodan | Rajasekar V R | International Journal of Computing 22 (2), 149-158 | 2023 | Click Here |
Hybridized Cryptographic Encryption and Decryption Using Advanced Encryption Standard and Data Encryption Standard | A Kanshi, R Soundrapandiyan, VSA Sofia, VR Rajasekar | Cybernetics and Information Technologies 23 (4), 63-78 | 2023 | Click Here |
Cloud Hosted Ensemble Learning-Based Rental Apartment Price Prediction Model Using Stacking Technique | S Rajkumar, L Ramanathan, VR Rajasekar, M Jantwal | Deep Learning Research Applications for Natural Language Processing, 229-238 | 2023 | Click Here |
A Study on Impact of DIS flooding Attack on RPL-based 6LowPAN Network | VR Rajasekar, S Rajkumar | Microprocessors and Microsystems 94, 104675 | 2022 | Click Here |
Analysis of Blackhole Attack in RPL-based 6LoWPAN Network: A Case Study | VR Rajasekar, S Rajkumar | 2021 28th IEEE Int’l Conf. on Electronics, Circuits, and Systems | 2021 | Click Here |
An Efficient and Reliable Data Flow Protection Scheme to Improve the QoS in MPLS Network | VR Rajasekar | Int’l Journal of Innovation in Computational Science and Engineering | 2021 | Click Here |
Adoption of Free and Open Source Software using Alternative Educational Framework in College of Applied Sciences | R Al-Hajri, G Al-Mukhaini, VR Rajasekar | arXiv:1702.05713 | 2017 | Click Here |
Password-based Authentication in Computer Security: Why is it still there | S Mohammed, L Ramkumar, VR Rajasekar | SIJ Trans. Comput. Sci. Eng. Its Appl 5, 33-36 | 2017 | Click Here |
The Need for Effective Information Security Awareness Practices in Oman Higher Educational Institutions | VR Rajasekar, S Khan, S Mohammed | arXiv:1602.06510 | 2016 | Click Here |
Usage of Cloud Computing Simulators and Future Systems for Computational Research | R Lakshminarayanan, VR Rajasekar | arXiv:1605.00085 | 2016 | Click Here |
Information Security Awareness at Oman Educational Institutions: An Academic Perspective | VR Rajasekar, R Lakshminarayanan, S Khan | arXiv:1605.05580 | 2016 | Click Here |
Challenges in Transforming, Engaging and Improving M-Learning in Higher Educational Institutions: Oman Perspective | R Lakshminarayanan, VR Rajasekar, SK Shaik | arXiv:1504.01139 | 2015 | Click Here |
A Review on Opportunities and Challenges in Implementing Free and Open Source Software in CAS | VR Rajasekar, Dr. Ramkumar Lakshiminarayan | 3rd Int’l Conf. of the Omani Society for Educational Tech. | 2015 | Click Here |
The Need for Effective Information Security Awareness Practices in Oman Higher Educational Institutions | VR Rajasekar, Mr. Shimaz Khan | 1st Symposium on Communication, Info Tech, and Biotechnology | 2015 | Click Here |
Multicasting of Images Resized Using Enhanced Seam Carving Technique in Hierarchical Group Communication | VR Rajasekar | Int’l Conf. on Network Computing and Information Security | 2012 | Click Here |
Improved Authentication and Key Agreement Protocol Using Elliptic Curve Cryptography | A Chandrasekar, VR Rajasekar, V Vasudevan | Int’l Journal of Computer Science and Security 3 (4), 325-333 | 2009 | Click Here |