PROFESSIONAL PREFACE
- Motivated, versatile, and creative educator with 25 years of experience in Government Engineering colleges in U.G. & P.G. levels with a sound commitment to the academic and social development of every student.
- Talent to design and implement engaging and inspiring lessons, effectively addressing every student's learning style and ability.
- Currently associated with Govt. College of Technology, Coimbatore as an Associate Professor.
CAREER GROWTH
College/Designation |
Period |
Government College of Technology, Coimbatore |
Since May 1999 |
Associate Professor - Computer Science & Engineering |
Since May 2010 |
Assisstant Professor (RD) - Computer Science & Engineering |
Sep 2006 to May 2010 |
Lecturer - Computer Science and Engineering |
May 1999 to Sep 2006 |
Lecturer/ECE,Government College of Engineering, Salem |
Oct 1988 to May 1999 |
Subjects Taken
UG/PG |
Subjects Handled |
UG |
Network Security, Distributed Operating System, Computer Architecture, Microprocessors and Microcontrollers etc |
PG |
Mobile Communication, Grid Computing, Advanced Computer Architecture, etc |
NOTABLE ATTAINMENTS
- Foregin Visit: Presented paper titled "Cryptanalysis of Vignere Cipher" at Massachusetts Institute of Technology, Boston in 2007.
- Guest Lectures Delivered in more than 15 Engineering Colleges under AICTE/TEQIP.
- Membership of Institution Life Member of the Indian Society of Technical Education.
- Board of Studies:
S.No |
Member for the following universities and Autonomous Institutions: |
1. |
Anna University of Technology, Coimbatore. |
2. |
Sona college of technology, Salem |
3. |
K.S.R college Of Technology, Tiruchengode. |
4. |
Adhiyaman College of Engineering, Hosur. |
5. |
Sri Ramakrishna Engineering College, Coimbatore. |
6. |
Nanda Engineering College, Erode. |
7. |
SNS College Of Technology, Coimbatore. |
- Number of Ph.Ds Awarded under the guidance: 10 Projects
Projects
1. Investigator of the project titled "Cryptanalysis using Genetic Algorithm" Sponsored by Ministry of Information Technology, New Delhi during 2005 - 2007.
2. Investigator of the project titled "Mobile Tamizagham" at Government College of Technology, Coimbatore.
3. Coordinator of the campus wide networking at Government College of Technology, Coimbatore sponsored by TEQIP, World Bank.
PUBLICATIONS – NATIONAL AND INTERNATIONAL JOURNALS
Authors |
Year of the Publication |
Title |
Journal |
Page No |
Purusothaman T., Annadurai S., Vijay Ganesh., Chockalingam C.T. and Uthra Kumar B |
2004 |
Dynamically Scalable, Heterogeneous, and Generic Architecture for a Grid of workstations |
Journal of Grid Computing, Springer (ISSN 1570-7873), vol.2, No.3 |
239-246. |
Annadurai S and Purusothaman T |
2005 |
Cost effective key management policies for pay programmes |
CSI communications (ISSN 0970-647X) |
22-24. |
Annadurai S and Purusothaman T |
2005 |
Key Management Issues for Internet Pay Sites |
Journal of Computer Society of India (ISSN 0254-7813) Vol.35, Issue No.3 |
22-30. |
Purusothaman T, Annadurai S. and Gopalkrishnan V. |
2006 |
Enhancing security through compression, randomized encryption and authentication |
ICGST International Journal on computer network and internet research. Oct 2006, Vol (5) Issue (3) |
1-8 |
Purusothaman T, Annadurai S. and Gopalkrishnan V. |
2007 |
An efficient hybrid rekeying mechanism for secure group communication |
Institution of Engineers (India). July 2007, Vol (88) |
12-16 |
Purusothaman T, and Kalpana M. |
2008 |
Hierarchial energy tree based energy aware GPRS algorithm for wireless sensor networks |
I-manager’s International journal on Software Engineering. January - March 2008, Vol .2,No.3 |
44 -49 |
T. M. Rajalakshmi, Dr. Purusothaman and S. Pratheeba |
2010 |
Collusion-Free Privacy Preserving Data Mining |
International Journal f Intelligent Information Technologies-October-December,2010, Vol.6, No.4 |
30-45 |
Shankar. S, Dr. Purusothaman. T |
2009 |
Utility Sentient frequent Itemset Mining and Association Rule Mining: A Literature Survey and Comparative Study |
International Journal of Soft Computing Applications, ISSN: 1453-2277, Issue 4 |
81-95. |
Shankar. S, Dr. Purusothaman. T |
2009 |
A Novel Utility Sentient Approach for Mining Interesting Association Rules |
IACSIT International Journal of Engineering and Technology, Volume 1 Number 5,ISSN:1793-8236 |
454-460 |
Shankar. S, Dr. Purusothaman. T, S. Kannimuthu, K. Vishnu Priya |
2010 |
A Novel Utility and Frequency Based Itemset Mining Approach for Improving CRM in Retail Business |
International Journal on Computer Applications |
- |
Shankar. S, Dr.Purusothaman.T |
2010 |
Discovering Imperceptible Associations Based on Interestingness: A Utility Oriented Data Mining Approach |
Data Science Journal, Volume 9 |
1-12 |
NATIONAL AND INTERNATIONAL CONFERENCE
Authors |
Title |
Conferences Details |
Page No |
Annadurai S. and Purusothaman T |
Key Management for Internet Pay Sites |
Proceedings of First National Conference on Modern Trends in Electrical and Instrumentation Systems – NCEIS – 2002, Mar 13- 14, Coimbatore |
273-280 |
Purusothaman T., Annadurai S., Shanmugalakshmi R., Valarmathi M.L. and Sumathy V. |
An adaptive tree structure algorithm for efficient key management in group communication |
15th International conference on Computer communication (ISBN 1-891365-08-8), Aug 12-14, Mumbai,vol.2 |
565-574 |
Purusothaman T., Annadurai S. and Shanmugalakshmi R |
Distributed authentication in Kerberos using public key cryptography |
National Conference On recent trends in Information Technology, Aug 22-24, Coimbatore |
126-130 |
Purusothaman T., Annadurai S. and Shanmugalakshmi R. |
An efficient approach for file transfer in Internet |
2nd FAE International Symposium, Nov 6-8, Turkey |
323-328 |
Purusothaman T., Chockalingam C.T, Uthra Kumar B. and Vijay Ganesh H |
Intelligent Job Allocation for Time Constrained parallel processing problems |
International Symposium on distributed computing and application to business, Engineering and Science, Dec 16-20(ISBN 7-5629-1881-3), China |
201-205 |
Annadurai S., Purusothaman T., Uthra Kumar B. and Vijay Ganesh. H |
An adaptive tree structure algorithm for efficient key management using Vertex Ant Walk algorithm |
International Conference on Agile Manufacturing - Internet Solutions, Dec 20 – 22, Bangalore |
|
Annadurai S., Purusothaman T., Uthra Kumar B. and Vijay Ganesh. H. |
Dynamically scalable, Undedicated, Heterogeneous, and Generic Architecture for a Grid of workstations |
National Conference on Innovations in Information and Communication technology, Mar.7-8, Coimbatore. |
|
Annadurai S. and Purusothaman T |
Scalable Secure Internet Group Mailing |
IEEE ACE 2003, 29th Annual Convention and Exhibition, IEEE India council, Dec 12-14, Pune |
|
Annadurai S., Purusothaman T. and Vasanthi A |
An Efficient and secured Stock Quote system through Internet |
National seminar on Recent Trends in Global Networking, Feb 14, Coimbatore. |
|
Annadurai S. and Purusothaman T. |
An Efficient and Secured Conference Key Agreement Protocol |
IIT Kanpur Hacker’s workshop, Feb 23 – 24, IIT Kanpur |
44-50 |
Purusothaman T. and Annadurai S |
Simulating Blue Active Queue Management Algorithms in a Differentiated Services |
Proceedings of the Second International Conference on Artificial Intelligence in Engineering & Technology, August 3-5, Kota Kinabalu, Sabah, Malaysia |
939-943. |
Purusothaman T. and Annadurai S |
An Efficient Key Agreement Protocol for Dynamic Peer Groups |
Proceedings of the Second International Conference on Artificial Intelligence in Engineering & Technology, August 3-5, Kota Kinabalu, Sabah, Malaysia |
657-661 |
Purusothaman T. and Annadurai S |
Content Distribution Using License Key Management Over a Scalable Secure Multicast Group Communication Network |
3rd FAE International Symposium, European University of Lefke, Turkey, November 25-26 |
221-224 |
Purusothaman T. and Annadurai S |
Cost-Effective Key Management Policies for Pay Programmes |
CSI-2004, 39th National Convention of Computer society of India, Mumbai, December 1-4 |
63-73 |
Purusothaman T., Annadurai S. and Kumar K |
Secure Group Communication Using GDH-Ika.1 and TGDH Protocols for Large Dynamic Peer Groups |
Proceedings of National Conference “Vision’05” on high performance computing, Government College of Engineering, Tirunelveli |
168-174 |
Purusothaman T, Palanisamy V and Arumugam S |
Attacking Vigenere’s Cipher using Genetic Algorithm |
International conference on Advanced Computing and Communication. Febraury 2007 |
SCHOLASTICS
Year of Passing |
Qualification |
2006 |
Ph.D. Computer Science and Engineering., Anna University, Chennai. |
2002 |
M.E., Computer Science Engineering., Bharathiar University, Coimbatore. |
1988 |
B.E, Electronics and Communication Engineering., University of Madras. |
PERSONAL DOSSIER
Father’s Name |
M Thiyagarajan. |
Date of Birth |
29th July 1967. |
Mobile No |
9842279020. |
Mail ID |
purusothaman.t@gct.ac.in |
Communication Address |
Site No.23, Murugan Colony, TVS Nagar, Coimbatore – 641 025. |