About us
Department of Information Technology

The Information Technology Department is at the forefront of technological innovation and digital transformation. Established in 2023, the department aims to provide a robust platform for students to excel in IT, one of the fastest-growing sectors globally. With an intake of 60 students for the academic year 2023, the department has quickly become a hub for technological education, focusing on empowering students with the skills needed to meet the demands of the ever-evolving tech landscape.

Why Information Technology?

Information Technology is the backbone of today's digital world, encompassing a wide range of fields, including software development, network management, cybersecurity, artificial intelligence, and data analytics. It involves the study and application of computing technologies to solve problems and improve processes across various industries. In addition to technical skills, IT professionals are expected to adapt to new trends and technologies rapidly, making it a highly dynamic and exciting career path.

Career Opportunities in Information Technology:
  • Software Development
  • Cybersecurity and Network Management
  • Data Science and Big Data Analytics
  • Artificial Intelligence and Machine Learning
  • Cloud Computing and DevOps
  • IT Consulting
  • Database Management and Administration
  • IT Project Management
Duration:
  • 4 years (Regular)
  • 3 years (Lateral Entry)
No. of Semesters:
  • 8 (Regular)
  • 6 (Lateral Entry)
No. of Seats:
  • Total - 60 Seats
Eligibility:

Candidates must have completed the 10+2 system of Education with a pass in Physics, Chemistry, and Mathematics in the qualifying examinations.

Scope for Higher Studies:
  • M.E. / M.Tech. / M.S.
  • MBA
  • Specialized certifications (Cloud Computing, Data Science, AI, etc.)

The Department of Information Technology is committed to producing professionals capable of designing, implementing, and managing cutting-edge technological solutions that meet the needs of industries and improve the lives of people worldwide.

Vision and Mission
Vision:

To be a leading department in the field of Information Technology.

To provide exceptional education and foster innovation.

To produce competent and ethical professionals who contribute to technological advancement and societal progress.

Mission:

To provide students with a comprehensive education in Information Technology.

To equip students with the necessary knowledge and skills to excel in a global technology-driven environment.

To develop technical expertise in core IT disciplines like software engineering, systems analysis, and networking.

To promote critical thinking and problem-solving abilities among students.

To foster a culture of research and innovation to address the evolving challenges in the IT industry.

To instil professional values and ethical responsibility, ensuring graduates make positive contributions to both the IT field and the community.

PEOs and POs
Program Educational Objectives (PEOs)

Graduates will be able to:

Demonstrate technical competence with analytical and critical thinking to understand and meet the diversified requirements of industry, academia, and research.

Exhibit technical leadership, team skills, and entrepreneurship skills to provide business solutions to real-world problems.

Work in multi-disciplinary industries with social and environmental responsibility, work ethics, and adaptability to address complex engineering and social problems.

Pursue lifelong learning, use cutting-edge technologies, and engage in applied research to design optimal solutions.

Program Outcomes (POs):

Engineering Knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and an engineering specialization to solve complex engineering problems.

Problem Analysis: Identify, formulate, review research literature, and analyze complex engineering problems, reaching substantiated conclusions using first principles of mathematics, natural sciences, and engineering sciences.

Design/Development of Solutions: Design solutions for complex engineering problems and design system components or processes that meet the specified needs with appropriate consideration for public health and safety, as well as cultural, societal, and environmental considerations.

Conduct Investigations of Complex Problems: Use research-based knowledge and research methods, including the design of experiments, analysis and interpretation of data, and synthesis of information to provide valid conclusions.

Modern Tool Usage: Create, select, and apply appropriate techniques, resources, and modern engineering and IT tools, including prediction and modeling, to complex engineering activities with an understanding of their limitations.

The Engineer and Society: Apply reasoning informed by contextual knowledge to assess societal, health, safety, legal, and cultural issues, and the consequent responsibilities relevant to professional engineering practice.

Environment and Sustainability: Understand the impact of professional engineering solutions in societal and environmental contexts, and demonstrate the knowledge of, and need for, sustainable development.

Ethics: Apply ethical principles and commit to professional ethics, responsibilities, and norms of engineering practice.

Individual and Team Work: Function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings.

Communication: Communicate effectively on complex engineering activities with the engineering community and society at large, such as comprehending and writing effective reports and design documentation, making effective presentations, and giving and receiving clear instructions.

Project Management and Finance: Demonstrate knowledge and understanding of engineering and management principles, applying these to one’s own work, as a member and leader in a team, to manage projects and in multidisciplinary environments.

Life-long Learning: Recognize the need for, and have the preparation and ability to engage in independent and life-long learning in the broadest context of technological change.

Career Opportunities in IT

Information Technology (IT) is a vast field offering a wide range of career paths across industries. Here's an overview of key opportunities:

1.Software Development
  • Roles:Software Engineer, Full-Stack Developer, App Developer
  • Skills Needed:Programming (Java, Python, C++), version control, databases
  • Industries:Tech, finance, healthcare, education
2. Web Development
  • Roles:Front-End Developer, Back-End Developer, Web Designer
  • Skills Needed:HTML, CSS, JavaScript, React, Node.js
  • Industries:E-commerce, digital marketing, startups
3. Data Science & Analytics
  • Roles:Data Analyst, Data Scientist, Business Intelligence Analyst
  • Skills Needed:Python/R, SQL, Machine Learning, Statistics
  • Industries:Finance, retail, healthcare, marketing
4. Cybersecurity
  • Roles:Security Analyst, Ethical Hacker, Security Engineer
  • Skills Needed:Network security, firewalls, cryptography, penetration testing
  • Certifications:CEH, CISSP, CompTIA Security+
5. Cloud Computing
  • Roles:Cloud Architect, Cloud Engineer, DevOps Engineer
  • Platforms:AWS, Azure, Google Cloud
  • Skills Needed:Cloud services, automation, Linux, containers
6. Artificial Intelligence & Machine Learning
  • Roles:AI Engineer, ML Engineer, NLP Specialist
  • Skills Needed:Python, TensorFlow, data modeling, statistics
  • Applications:Chatbots, self-driving cars, medical diagnostics
7. Networking & System Administration
  • Roles:Network Administrator, System Admin, IT Support
  • Skills Needed:Networking, OS management (Linux/Windows), hardware, troubleshooting
8. Database Management
  • Roles:Database Administrator (DBA), SQL Developer, Data Architect
  • Skills Needed:SQL, Oracle, MongoDB, performance tuning
9. IT Consulting & Project Management
  • Roles:IT Consultant, Project Manager, Scrum Master
  • Skills Needed:Communication, Agile, project planning, stakeholder management
  • Certifications:PMP, PRINCE2, Scrum
10. UI/UX Design
  • Roles:UI Designer, UX Researcher, Interaction Designer
  • Skills Needed:Figma, Adobe XD, design thinking, wireframing
Emerging Fields
  • Blockchain Development
  • Internet of Things (IoT)
  • Quantum Computing
  • Augmented & Virtual Reality (AR/VR)
Career Growth Tips
  • Learn continuously (MOOCs, certifications)
  • Work on real-world projects and internships
  • Contribute to open-source or GitHub
  • Build a strong LinkedIn/GitHub profile
  • Faculty Members
  • Curriculum/Syllabus
  • Laboratory
  • E-Content Corner
  • R & D
  • MoU
  • Placements
  • Students Corner
  • Student Activities

Faculty Members

...
Mr. V.R. RAJASEKAR V RM.E., (P.hd)

Assistant Professor/ HOD (AI&DS & IT)

...
MRS. RAMYA ETTIKAN

B.Tech., M.E.,

ASSISTANT PROFESSOR

...
MR. KRISHNAN R

B.E., M.E.,

ASSISTANT PROFESSOR

...
MRS. RAMYA S

B.TECH., M.E.,

ASSISTANT PROFESSOR

...
MR. PRASANTH N

B.TECH., M.E.,

ASSISTANT PROFESSOR

...
MR. MOHANKUMAR M

B.E., M.E.,

ASSISTANT PROFESSOR

...
MRS. NANDHINI

B.E., M.E.,

ASSISTANT PROFESSOR

Laboratory

S.No Course Code Course Title Category L T P C Credits Semester
1. GE3171 Problem Solving and Python Programming Laboratory ESC 0 0 4 4 2 Semester 1
2. BS3171 Physics and Chemistry Laboratory BSC 0 0 4 4 2 Semester 1
3. GE3172 English Laboratory $ EEC 0 0 2 2 1 Semester 1
4. GE3271 Engineering Practices Laboratory ESC 0 0 4 4 2 Semester 2
5. AD3271 Data Structures Design Laboratory PCC 0 0 4 4 2 Semester 2
6. GE3272 Communication Laboratory / Foreign Language $ EEC 0 0 4 4 2 Semester 2
7. AD3381 Database Design and Management Laboratory PCC 0 0 3 3 1.5 Semester 3
8. AD3311 Artificial Intelligence Laboratory PCC 0 0 3 3 1.5 Semester 3
9. GE3361 Professional Development $ EEC 0 0 2 2 1 Semester 3
10. AD3411 Data Science and Analytics Laboratory PCC 0 0 4 4 2 Semester 4
11. AD3461 Machine Learning Laboratory PCC 0 0 4 4 2 Semester 4
12. AD3511 Deep Learning Laboratory PCC 0 0 4 4 2 Semester 5
13. AD3512 Summer Internship EEC 0 0 0 0 2 Semester 5

E-Content Corner

S.No Course Code Course Title Download Link
1. IP3151 Induction Programme Click here
2. HS3152 Professional English - I Click here
3. MA3151 Matrices and Calculus Click here
4. PH3151 Engineering Physics Click here
5. CY3151 Engineering Chemistry Click here
6. GE3151 Problem Solving and Python Programming Click here
7. GE3152 Heritage of Tamils Click here
8. GE3171 Problem Solving and Python Programming Laboratory Click here
9. BS3171 Physics and Chemistry Laboratory Click here
10. GE3172 English Laboratory Click here
11. HS3252 Professional English - II Click here
12. MA3251 Statistics and Numerical Methods Click here
13. PH3256 Physics for Information Science Click here
14. MA3354 Discrete Mathematics Click here
15. CS3351 Digital Principles and Computer Organization Click here

Research and Development

Title Authors Journal / Conference Year
FPES-IDS: Forecast-Path and Exponential Smoothing-based Intrusion Detection System to Mitigate Blackhole Attack in RPL-based 6LoWPANs VR Rajasekar, S Rajkumar IEEE Access 2025
Evaluating the impact of selective forwarding attacks on RPL-based 6LoWPAN in IoT: a comprehensive simulation study VR Rajasekar, S Rajkumar Computing 107 (3), 1-37 2025
A review of isolation attack mitigation mechanisms in RPL-Based 6LoWPAN of internet of things VR Rajasekar, S Rajkumar Computer Assisted Methods in Engineering and Science 31 (3) 2024
DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN VR Rajasekar, S Rajkumar Cluster Computing 27 (9), 12029-12068 2024
A Study on Internet of Things Devices Vulnerabilities using Shodan Rajasekar V R International Journal of Computing 22 (2), 149-158 2023
Hybridized Cryptographic Encryption and Decryption Using Advanced Encryption Standard and Data Encryption Standard A Kanshi, R Soundrapandiyan, VSA Sofia, VR Rajasekar Cybernetics and Information Technologies 23 (4), 63-78 2023
Cloud Hosted Ensemble Learning-Based Rental Apartment Price Prediction Model Using Stacking Technique S Rajkumar, L Ramanathan, VR Rajasekar, M Jantwal Deep Learning Research Applications for Natural Language Processing, 229-238 2023
A Study on Impact of DIS flooding Attack on RPL-based 6LowPAN Network VR Rajasekar, S Rajkumar Microprocessors and Microsystems 94, 104675 2022
Analysis of Blackhole Attack in RPL-based 6LoWPAN Network: A Case Study VR Rajasekar, S Rajkumar 2021 28th IEEE Int’l Conf. on Electronics, Circuits, and Systems 2021
An Efficient and Reliable Data Flow Protection Scheme to Improve the QoS in MPLS Network VR Rajasekar Int’l Journal of Innovation in Computational Science and Engineering 2021
Adoption of Free and Open Source Software using Alternative Educational Framework in College of Applied Sciences R Al-Hajri, G Al-Mukhaini, VR Rajasekar arXiv:1702.05713 2017
Password-based Authentication in Computer Security: Why is it still there S Mohammed, L Ramkumar, VR Rajasekar SIJ Trans. Comput. Sci. Eng. Its Appl 5, 33-36 2017
The Need for Effective Information Security Awareness Practices in Oman Higher Educational Institutions VR Rajasekar, S Khan, S Mohammed arXiv:1602.06510 2016
Usage of Cloud Computing Simulators and Future Systems for Computational Research R Lakshminarayanan, VR Rajasekar arXiv:1605.00085 2016
Information Security Awareness at Oman Educational Institutions: An Academic Perspective VR Rajasekar, R Lakshminarayanan, S Khan arXiv:1605.05580 2016
Challenges in Transforming, Engaging and Improving M-Learning in Higher Educational Institutions: Oman Perspective R Lakshminarayanan, VR Rajasekar, SK Shaik arXiv:1504.01139 2015
A Review on Opportunities and Challenges in Implementing Free and Open Source Software in CAS VR Rajasekar, Dr. Ramkumar Lakshiminarayan 3rd Int’l Conf. of the Omani Society for Educational Tech. 2015
The Need for Effective Information Security Awareness Practices in Oman Higher Educational Institutions VR Rajasekar, Mr. Shimaz Khan 1st Symposium on Communication, Info Tech, and Biotechnology 2015
Multicasting of Images Resized Using Enhanced Seam Carving Technique in Hierarchical Group Communication VR Rajasekar Int’l Conf. on Network Computing and Information Security 2012
Improved Authentication and Key Agreement Protocol Using Elliptic Curve Cryptography A Chandrasekar, VR Rajasekar, V Vasudevan Int’l Journal of Computer Science and Security 3 (4), 325-333 2009

Memorandum of Understanding (MOU)

Under Construction

Placements

Under Construction

Students Corner

Title Authors Journal / Conference Year Link
FPES-IDS: Forecast-Path and Exponential Smoothing-based Intrusion Detection System to Mitigate Blackhole Attack in RPL-based 6LoWPANs VR Rajasekar, S Rajkumar IEEE Access 2025 Click Here
Evaluating the impact of selective forwarding attacks on RPL-based 6LoWPAN in IoT: a comprehensive simulation study VR Rajasekar, S Rajkumar Computing 107 (3), 1-37 2025 Click Here
A review of isolation attack mitigation mechanisms in RPL-Based 6LoWPAN of internet of things VR Rajasekar, S Rajkumar Computer Assisted Methods in Engineering and Science 31 (3) 2024 Click Here
DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN VR Rajasekar, S Rajkumar Cluster Computing 27 (9), 12029-12068 2024 Click Here
A Study on Internet of Things Devices Vulnerabilities using Shodan Rajasekar V R International Journal of Computing 22 (2), 149-158 2023 Click Here
Hybridized Cryptographic Encryption and Decryption Using Advanced Encryption Standard and Data Encryption Standard A Kanshi, R Soundrapandiyan, VSA Sofia, VR Rajasekar Cybernetics and Information Technologies 23 (4), 63-78 2023 Click Here
Cloud Hosted Ensemble Learning-Based Rental Apartment Price Prediction Model Using Stacking Technique S Rajkumar, L Ramanathan, VR Rajasekar, M Jantwal Deep Learning Research Applications for Natural Language Processing, 229-238 2023 Click Here
A Study on Impact of DIS flooding Attack on RPL-based 6LowPAN Network VR Rajasekar, S Rajkumar Microprocessors and Microsystems 94, 104675 2022 Click Here
Analysis of Blackhole Attack in RPL-based 6LoWPAN Network: A Case Study VR Rajasekar, S Rajkumar 2021 28th IEEE Int’l Conf. on Electronics, Circuits, and Systems 2021 Click Here
An Efficient and Reliable Data Flow Protection Scheme to Improve the QoS in MPLS Network VR Rajasekar Int’l Journal of Innovation in Computational Science and Engineering 2021 Click Here
Adoption of Free and Open Source Software using Alternative Educational Framework in College of Applied Sciences R Al-Hajri, G Al-Mukhaini, VR Rajasekar arXiv:1702.05713 2017 Click Here
Password-based Authentication in Computer Security: Why is it still there S Mohammed, L Ramkumar, VR Rajasekar SIJ Trans. Comput. Sci. Eng. Its Appl 5, 33-36 2017 Click Here
The Need for Effective Information Security Awareness Practices in Oman Higher Educational Institutions VR Rajasekar, S Khan, S Mohammed arXiv:1602.06510 2016 Click Here
Usage of Cloud Computing Simulators and Future Systems for Computational Research R Lakshminarayanan, VR Rajasekar arXiv:1605.00085 2016 Click Here
Information Security Awareness at Oman Educational Institutions: An Academic Perspective VR Rajasekar, R Lakshminarayanan, S Khan arXiv:1605.05580 2016 Click Here
Challenges in Transforming, Engaging and Improving M-Learning in Higher Educational Institutions: Oman Perspective R Lakshminarayanan, VR Rajasekar, SK Shaik arXiv:1504.01139 2015 Click Here
A Review on Opportunities and Challenges in Implementing Free and Open Source Software in CAS VR Rajasekar, Dr. Ramkumar Lakshiminarayan 3rd Int’l Conf. of the Omani Society for Educational Tech. 2015 Click Here
The Need for Effective Information Security Awareness Practices in Oman Higher Educational Institutions VR Rajasekar, Mr. Shimaz Khan 1st Symposium on Communication, Info Tech, and Biotechnology 2015 Click Here
Multicasting of Images Resized Using Enhanced Seam Carving Technique in Hierarchical Group Communication VR Rajasekar Int’l Conf. on Network Computing and Information Security 2012 Click Here
Improved Authentication and Key Agreement Protocol Using Elliptic Curve Cryptography A Chandrasekar, VR Rajasekar, V Vasudevan Int’l Journal of Computer Science and Security 3 (4), 325-333 2009 Click Here