The Computer Science and Engineering (CS&E) program was started in the year 1983.The main focus of the department is to produce graduates & post graduates with strong fundamentals in Computer Science and Engineering domain. The course is outcome based education with choice based credit system to help students to achieve their goal. The department has a total of 36 teaching faculty members with various specializations, out of which 8 are PhD holders and 15 are pursuing Ph.D. Faculties in the department have outstanding teaching experience. Department started its PG program in the year 2000 with the specialization of Computer Science and Engineering.
Department has an outstanding placement statistics and our students have been placed in leading IT companies like DXC TECHNOLOGY, INFOSYS, TCS, IBM, BENZ, WIPRO, COGNIZANT, ORACLE, HCL, NOKIA, , L&T, JSPIDER, TECH MAHINDRA ,BYJU'S, GLOBAL EDGE, MINDTREE, SUBEX, ROBOSOFT, MPHASIS, AD2PRO and many more.
"The Department of Computer Science and Engineering shall create professionally competent and socially responsible engineers capable of working in global environment."
Graduates of the program will be able to
Engineering Graduates will be able to
The Under Graduate (UG) of B.E Computer Science & Engineering Program has defined Program Specific Outcomes (PSO) which are listed below.
Name of Technical Staff | Designation | Qualification | Work Experience (Yrs.) |
---|---|---|---|
Manu kumar H.M | System Analyst | B.E. | 9 yrs |
M.N .Kishore | Computer Programmer | B.Sc, PGDCA | 21 yrs |
G.K.Thiruneelakataswamy | Computer Operator | B.Sc, PGDCA | 18 yrs |
M.S.Sunitha | Computer Operator | B.Sc(CS), M.Sc[IT] | 16 yrs |
A.L. Shobharani | Computer Operator | B.Sc(CS) | 18 yrs |
M.S.Kusuma | Computer Operator | Diploma in E&C | 15 yrs |
M.K.Vidyashree | Computer Instructor | Diploma in CS | 12 yrs |
Hanume Gowda | Instructor | Diploma in CS, B.E in C.S | 5 yrs |
Hariprasad | |||
C.Basavaraju | Mechanic | SSLC | 27 yrs |
K.Sreedhar Prasad | System Admin | M.Sc | 12 yrs |
M.Sathish | Helper | SSLC | 13 yrs |
Manohara.H.S | Helper | SSLC | 4 yrs |
Amrutha | Helper | 14 yrs | |
Shubha | Instructor | Diploma in EC |
Name of the Research Guide | Phone Number | Email-Id |
---|---|---|
Dr. M.C. Padma | +91 9141113030 | padmamc@pesce.ac.in |
Dr. R Girisha | +91 99452 12969 | write2girisha@gmail.com |
Dr. Minavathi | +91-9845302882 | minavathi@pesce.ac.in |
Dr. Nagarathna | +91 9481210125 | nagarathna@pesce.ac.in |
Dr. Vinay S | +91 9986515835 | vinay@pesce.ac.in |
Dr. D.R.Umesh | +91 9886160070 | drumesh@pesce.ac.in |
Dr. Mahesh Kaluti | +91 7975767665 | mahesh.rkcet@gmail.com |
Name | Guide Name | Title of Research | Date of Final Viva Completed |
---|---|---|---|
Puttegowda D | Dr. M.C. Padma | Automatic Event Classification using Video Mining Algorithms | Jan- 2017 |
Prathibha R.J | Dr. M.C. Padma | Development of Morphological stemmer, analyzer and generator for Kannada nouns | April- 2018 |
Mohammed Ahmed Ali Abdu Alrhman | Dr. M.C. Padma | Design of Robust Concept Drift adoption Strategies for High Speed Data Stream Mining. | May- 2019 |
Name | Guide Name | University/Research Center | Topic Status |
---|---|---|---|
R.S.Prasanna kumar | Dr S N Thimmaraju | VTU | Course work Completed |
Veena M. | Dr. M.C. Padma | VTU | Comprehensive Viva Completed |
Girish Babu | Dr. M.C. Padma | VTU | Comprehensive Viva Completed |
Suraj B S | Dr. M.C. Padma | VTU | Registered and preparing for course work |
Ramyashree H P | Dr. Minavathi | VTU | Comprehensive Viva Completed |
Deepika | Dr. Nagarathna | VTU | course work Completed |
Shwetha M K | Dr. Nagarathna | VTU | Registered and preparing for course work |
Chaitra B P | Dr. M L Anitha | VTU | Registered and preparing for course work |
V Chethan kumar | Dr. Umesh D R | VTU | Registered and preparing for course work |
Shruthi P S | Dr. Umesh D R | VTU | Registered and preparing for course work |
C Chethana | Dr. Deepu singh | VTU | Registered and preparing for course work |
Bhavya D | Dr D S Vinod | JSS,Mysore | course work completed |
Jayshankar | IIT,varanasi | course work completed | |
Yoga B S | IIT,Roorkie | Registered |
Research Scholar | Title | Status | Details Link |
---|---|---|---|
Mrs. Manasa K.N | Framework for Analyzing the Intensity of Sentiments in Social Media | Registered and preparing for course work | Click here for more |
Application Number | Title | Faculty | Status |
---|---|---|---|
No. 201741020992 | AI based Inventory Management system & method thereof | Dr. R Girisha | Published |
No. 201741020994 | Electronic processing of paper invoices | Dr. R Girisha | Published |
No. 201741020993 | System & method for automatic data management between user devices | Dr. R Girisha | Published |
No. 201741020991 | A Method & system for Business Intelligence Analytic | Dr. R Girisha | Published |
No. 201741020994 | Electronic processing of paper invoices | Dr. R Girisha | Published |
No. 201741021216 | A system & method for buying & selling goods | Dr. R Girisha | Published |
Project Title | Year | Funding Agency | Amount (Rs.) | Status |
---|---|---|---|---|
Establishing the Internet of Things (IoT) Laboratory for Post Graduate and Research programs | June 2016 | VGST | 20 Lakhs | Sanctioned |
Business Incubator- Support for Entrepreneurial and Managerial Development of SMEs through Incubators | January 2017 | MSME, Govt. of India | 6.25 lakhs for each project | Sanctioned |
Setting up Network Forensic lab under VGST | August 2017 | VGST | 20 Lakhs | Sanctioned |
Network forensics is a subfield of digital forensics where evidence is captured from networks and interpretation is substantially based on knowledge of cyber attacks. It aims to locate the attackers and reconstruct their attack actions through analysis of intrusion evidence. Major technical challenges facing network forensics analysis: Current sources of intrusion evidence such as IDS alerts are not well adapted for forensics investigation. Cyber attacks are increasingly sophisticated. Short response times. Major objectives of network forensics analysis can be summarized into two fundamental problems: attack group identification and attack scenario reconstruction. Attack scenario reconstruction is the process of inferring step-wise actions taken by the attacker to achieve his malicious objective. Attack group identification is the task of discovering the group of hosts involved in the attack and determining the roles of each host in the group.
The main objectives of our proposed project are
Getting other application protocol details for analysis like DNS-protocol This project concentrates on taking care of Deformed Packets with appropriate flags, Aggregation and reassembly of packets. It is not dependent on NIC and it is a Hardware engine. Thus there Tuning intrusion prevention and detection solutions
Data Science is a subject of Computer Science aimed at building machines and computers that can enhance logical operations. AI systems have the ability to execute tasks naturally associated with human intelligence, like speech recognition, decision-making, visual perception, and translating languages.
Machine Learning is one of the widely used algorithms of AI. The learning process involves the enhancement of new declarative knowledge, the advancement of cognitive and motor skills through practice or instruction. Since the beginning of the computer era, researchers and scientists have been trying to implant such abilities in computers. Solving this issue has been, and remains, most fascinating and challenging long-term goal in AI.
Some of the applications of Data Science are as follows:
NLP is a method in which computers are made to understand, execute and manipulate human language. To reach this goal, a computer should be able to “understand” a large amount of data – from grammar syntax and rules to various accents and colloquialisms. Whereas a speech recognition system, for example, manual speech becomes audio data, which then turns into text data, a complex process itself. This text data can be implemented in an “intelligent” system for different applications such as controlling devices or translators.
Computer vision is the science of manipulating or understanding videos and images. It has many applications, comprising of augmented reality, autonomous driving and industrial inspection. The implementation of deep learning for computer vision can be differentiated into many categories: detection, generation, segmentation and classification, both in videos and images.
Companies in the financial sector are able to identify key insights in financial data as well as prevent any occurrences of financial fraud, with the help of machine learning technology. The technology is also used to identify opportunities for investments and trade. Usage of cyber surveillance helps in identifying those individuals or institutions which are prone to financial risk, and take necessary actions in time to prevent fraud.
Companies are using machine learning technology to analyze the purchase history of their customers and make personalized product recommendations for their next purchase. This ability to capture, analyze, and use customer data to provide a personalized shopping experience is the future of sales and marketing.
Government agencies like utilities and public safety have a specific need FOR Ml, as they have multiple data sources, which can be mined for identifying useful patterns and insights. For example sensor data can be analyzed to identify ways to minimize costs and increase efficiency. Furthermore, ML can also be used to minimize identity thefts and detect fraud.
With the advent of wearable sensors and devices that use data to access health of a patient in real time, ML is becoming a fast-growing trend in healthcare. Sensors in wearable provide real-time patient information, such as overall health condition, heartbeat, blood pressure and other vital parameters. Doctors and medical experts can use this information to analyze the health condition of an individual, draw a pattern from the patient history, and predict the occurrence of any ailments in the future. The technology also empowers medical experts to analyze data to identify trends that facilitate better diagnoses and treatment.
Based on the travel history and pattern of traveling across various routes, machine learning can help transportation companies predict potential problems that could arise on certain routes, and accordingly advise their customers to opt for a different route. Transportation firms and delivery organizations are increasingly using machine learning technology to carry out data analysis and data modeling to make informed decisions and help their customers make smart decisions when they travel.
This is perhaps the industry that needs the application of machine learning the most. Right from analyzing underground minerals and finding new energy sources to streaming oil distribution, ML applications for this industry are vast and are still expanding.
Proposed Data Science will be set up at the institute level and it can be used by students or faculty members of any engineering department. AI and ML have varied applications across different engineering streams.
Center of Excellence on Internet of Things (IoT) is established for carrying out projects and research work by Undergraduate/Post Graduate students and Research students/faculties at Department of Computer Science and Engineering, PES College of Engineering, Mandya. The above said laboratory has the overall goal of identifying and providing solutions for the real life problems and also research problems. As an outcome of the established laboratory, a number of projects on Internet of Things were developed by a number of talented UG/PG students. Some team members are working in collaboration with different start- up companies/ practitioners to address the real life problems and to give solutions for the societal issues.
Various components used for developing a number of projects on different types of problems are given below. 1. Gold pack of Zolertia Device ( 10 no’s ) 2. Zolertia gateway 3. Arduino UNO R3 board with DIP ATmega328P 4. Arduino Yun 5. Arduino Ultrasonic Range Finder Module Sensor Distance Measuring Transducer 6. Microphone sound sensor module 7. MQ-7 Carbon Monoxide Detection Sensor 8. Ethernet W5100 Shield Network Expansion Board w/ Micro SD Card Slot 9. Electronic Components {Bread boards, Jumper, cables, LED's, Resistors, Capacitors, Transistors} 10. Finger-clip Heart Rate Sensor with shell 11. Serial Camera Kit 12. PIR Motion Sensor - Large Lens version 13. GSR sensor 14. GPS Module 15. EMG Detector 16. Wind Speed/ Direction Sensor 17. Fingerprint Sensor 18. Water Flow Sensor 19. Adult reusable NIBP cuff 20. Raspberry Pi 2 Model B 1GB 21. Soil moisture sensor 22. Water level switch 23. Flame Sensor
Methodology 1. Internet of Things (IoT) Laboratory has been established with the required facilities for implementing the projects on various problems chosen from the societal issues. 2. Interaction with various experts from different start-up companies/ practitioners to address the real life problems. 3. Best possible solutions are developed by using the equipments in the Internet of Things (IoT) Laboratory. 4. Challenges in developing solutions for some more realistic problems are the focus of forthcoming days. Outcome: A number of projects on Internet of Things are developed by a number of talented UG and PG students.
“PESCE set the foundation of my career. Computer Science fundamentals I learnt there are still helping me do my job. And my years there were the most fun full ones to date."
pivotal point in career of its students. The campus boasts of good infrastructure and along with it also has a set of well experienced faculties which make learning process a whole lot easier. Being located about 100 Km away from Bangalore it helps in getting away from the City’s hassles and provides a nice peaceful environment for learning. It has a cultural mix within its students as there are students from different parts of India studying along with a bunch of local students. Placements are fairly decent as well. Overall it’s a nice place for not only academics but foverall development of one's personality
"I am very fortunate to write my experience in PES,From the starting day to the last day of my college PES has made all my days memorable,Right from diversity to academic excellence PES has it all,at last my special thanks to the teachers who have always been the support system for all the students,thank you PES for making the future bright of all the students who been part of PESCE....!".