Data Science
About the Department
Department of Data Science (DS) has been established in the year 2024 with a goal of training students for data–centric world and human values. The students will have an opportunity to learn principles, tools and techniques to model various real-world problems, analyze them, and discover useful information. The primary focus of this programme is to equip students with statistical skills, Learning algorithms, knowledge discovery and visualization skills.
COURSES
- B.Sc., Data Science
VISION
The vision of the Department of Data Science is to create the next generation of students as data scientists who will solve these grand challenges and innovate through world-class research to take advantage of these opportunities.
MISSION
- To Develop the skills and knowledge to analyze data in many forms and communicate insights.
- To impart quality and value based education and contribute towards the innovation of computing, expert system, Data Science to raise satisfaction level of all stakeholders.
- Our effort is to apply new advancements in high performance computing hardware and software.
Faculty

Ms. A POORNIMA M.Sc.,M.Phil.,SET.,MBA.,(Ph.D).,
HOD

Dr. G DHAMODHARAN M.C.A.,Ph.D.,SET.,NET.
Assistant Professor
Dr. Dhamodharan G is an accomplished Computer Science Teacher with 11 years of experience, specializing in technology use and application. Currently s
Read more...Dr. Dhamodharan G is an accomplished Computer Science Teacher with 11 years of experience, specializing in technology use and application. Currently serving as an Assistant Professor at Marudhar Kesari Jain College for Women in Vaniyambadi, Tamil Nadu, Dr. Dhamodharan has previously held positions at Don Bosco College (Co-Ed) in Yelagiri Hills and Shanmuga Industries Arts and Science College in Tiruvannamalai.
He holds a Ph.D. in Computer Science from Don Bosco College (Co-Ed) and has completed his M.C.A. and B.Sc. in Computer Science from Jaya Engineering College and Shanmuga Industries Arts & Science College, respectively. Dr. Dhamodharan has also successfully cleared the National Eligibility Test (NET) conducted by the University Grants Commission and the State Eligibility Test (SET) conducted by Mother Teresa Women’s University, both in Computer Science & Applications.
Publications
International Journals
[1] |
An Innovative Algorithm for Enhanced PDF-Based Chatbot in Domain-Specific Question Answering Dhamodharan G, Kaleemullah, A In Library Progress International, , Dec 2024.
Abstract [+]
Abstract |
[2] |
Enhancing Quality and Productivity in Software Engineering: An Ontology-Driven Prescriptive Agile Framework Deepa, T., S. Thaddues, and G. Dhamodharan In International Journal of Intelligent Systems and Applications in Engineering, , Sep 2024.
Abstract [+]
The prescriptive agile framework is a novel approach that leverages an integrated process ontology, involving agile Scrum and OpenUp methodologies. The objective is to enhance both productivity and quality within software development projects where fresh developers are engaged. Key Process elements of OpenUP and agile Scrum are used to construct the ontology. The ontology is defined and instantiated with software projects having the complete user stories. Subsequently a three-sprint project experiment is conducted. The metrics of Earned Value (EV) and Code Maintainability are used to gauge productivity and quality. This research contributes to improving productivity and code quality in software engineering particularly when there are many amateurs. |
[3] |
Performance Measurement Framework for Agile Scrum Software Engineering Environment Deepa, T., S. Thaddues, and G. Dhamodharan In International Journal of Intelligent Systems and Applications in Engineering, , Aug 2024.
Abstract [+]
Performance of individual developers and effort on reworks in agile scrum environments has an impact on the productivity and quality of the developed software. The traditional agile metrics do not consider reworks in measuring productivity. Yet, an enhanced methodology to compute individual performance and quantify reworks in agile scrum contexts is required. By introducing Earned Value Analysis based Productivity Ratio and Blended Quality Metric based on Code Maintainability Index, this gap is bridged. Applying the metrics to ten real time software projects over eighteen months, having twelve sprints each, a framework is decided for performance management in agile scrum development. The findings indicate the efficacy of the metrics in providing valuable insights to improve productivity and quality measures in software development environments. |
[4] |
An Enhanced and Dynamic Key AES Algorithm for Internet of Things Data Security Dhamodharan G, S. Thaddeus In Journal of Advanced Zoology, , Apr 2023.
Abstract [+]
Internet of Things (IoT) applications have become ubiquitous in various aspects of daily life, including smart homes, healthcare, and other areas where human assistance is crucial. However, the valuable real-world data collected by IoT devices and transmitted over the Internet have become a prime target for numerous malicious actors and hackers. Therefore, ensuring secure communication to prevent unauthorized access to this transmitted data is of paramount importance. This research is dedicated to the development of a robust security system for IoT to protect sensor data. Traditionally, IoT systems have relied on fixed encryption keys shared between transmitters and receivers, which presented vulnerabilities as these keys could be easily compromised. In this study, we introduce an enhanced version of the AES algorithm with dynamic keys. In this modified algorithm, each cycle involves the XOR operation of four keywords with the sequence number. Each round of the AES algorithm incorporates various transformations, including DivideSwap, SubBytes, ShiftRows, MixColumns, and AddRoundKey, with the exception of the final round, which excludes the MixColumns operation. To implement and test this upgraded security approach, we utilized hardware components such as the Arduino Uno, ESP8266, and DHT11 sensors. The enhanced AES algorithm was integrated into the Arduino Uno to secure sensor data before transmission across the network. The results of our analysis demonstrate that the proposed IoT security method presents a significantly higher level of cryptographic resilience compared to the traditional AES algorithm, making it a robust solution for safeguarding IoT data. |
[5] |
An Optimized and Secure Elliptic Curve Cryptography For The Internet Of Things Dhamodharan G, S. Thaddeus In Journal of Pharmaceutical Negative Results , , Nov 2022.
Abstract [+]
The Internet of Things is a developing network of embedded gadgets that can connect with the outside world (IoT). Since IoT devices have limited storage, memory, and processing power, they should typically offer the choice to run at lower power levels. These constrained devices are unsuited for security measures that significantly rely on encryption since they cannot carry out complex encryption and decryption quickly enough to allow for the possibility of reliably transferring information in real-time. A public-key encryption method called elliptic curve cryptography is utilised in an IoT setting to guarantee security, however it takes a long time to evaluate because of its scalar increase. While still adhering to the requirements of extremely lightweight encryption, ECC is currently slower than AES. The memory requirements for ECC must be decreased in order for the system to consume less RAM and ROM during operation. This work decreases the scalar increase in the elliptic curve and proposes a novel mapping strategy in order to speed up the assessment process. The succession number multiplies the plain text corresponding ASCII values. The elliptic curve will be input with the multiplied values. By using this innovative technique, ASCII value plaintext avoids overt repetition. The technique is intended to be used to encode or decode any plaintext message that contains ASCII values and a sequence number. |
[6] |
Multifarious mapping schemes on Elliptic curve cryptography for IoT security Dhamodharan G, S. Thaddeus In Test Engineering and Management , , Oct 2021.
Abstract [+]
Elliptic Curve Cryptography (ECC) is a current area of enquiry in the domain of Cryptography. ECC is beneficial in various schemes of cryptography due to its lowered key size and rapid generation of key. It is suitable for IoT devices to provide security. Many IoT devices have restricted amount of storage and processing ability. They frequently need to run on low power. Heavy encryption dependent approaches are not a good fit for these constrained devices. They are incapable of performing complicated encryption and decryption quick enough to be able to secure data in real-time transmission. Transformation of text messages to elliptic curve points has always been enigmatic. Comparing to other cryptographic algorithms the arithmetic involved in elliptic curve cryptography is computationally less complicated. This paper provides an overview of elliptic curves, different mapping schemes and their application in cryptography. The emphasis is on the performance gains to be acquired by using elliptic curve cryptography as an alternative to conventional cryptosystem like RSA. |
[7] |
Embedding elliptic curve cryptography and twofish algorithm to improve data security in Internet of things Dhamodharan G, S. Thaddeus In Advances in Mechanics, , Oct 2021.
Abstract [+]
The implicit idea of the IoT is to follow client's identity effectively, so the security and protection concerns like theft the information and disturbance of tasks are turning out to be basic issues in the present IoT applications. Aggressor can pick up the access to the system can harm the physical gadgets of IoT can harm the system which bargains the protection and security of IoT. As the IoT gadgets have low memory, less force and data transmission a productive arrangement to give security is required that won't chomp through the resources of IoT. Because of the resource constrained condition in IoT the regular algorithms isn't sufficient to guarantee the information security. So we want a less computational expense as far as force utilization, memory management and more effective cryptography algorithms to offer more information security in IoT. This paper shows the hybrid cryptography security in IoT by embedding of ECC and TwoFish calculation, which gives an enhanced answer for upgrade the security highlights of the IoT with the goal that we can improve the administration therefore achieves growing the trust over the advancement. |
National Journals
[1] |
A survey on IoT based healthcare monitoring system Dhamodharan G, S. Thaddeus In Wesleyan Journal of Research, , Sep 2021.
Abstract [+]
The Internet of Things (IoT) is a paradigm where everyday objects can be equipped with |
International Conferences
[1] |
A new secure mapping scheme on elliptic curve cryptography for internet of things Dhamodharan G, S. Thaddeus In AIP Conf. Proc., , Apr 2024.
Abstract [+]
Elliptic Curve Cryptography is a novel exploration public key algorithm in the region of Cryptography. It is reasonable for IoT gadgets to give security. Numerous IoT gadgets have confined measure of processing ability and memory capacity. Elliptic curve furnishes more significant level of security with less key size contrasted with other lightweight Cryptographic methods. Change of instant messages to elliptic curve points has been baffling all of the time. A new mapping scheme has been proposed in this paper. The relating ASCII values of the plain text are multiplied with sequence number. The multiplied values will be input for the elliptic curve. This new method evades the overt repetitiveness ASCII value plaintext. The algorithm is designed so that it tends to be utilized to encode or decode any given plaintext message of ASCII values with sequence number. |
Workshops and Seminars Attended
National Workshops
[1] |
National Workshop on Cryptography – 2019 Attended, 26 Sep 2019 to 28 Sep 2019 |
International Conferences
[1] |
Two Days International Virtual Conference on Machine Learning Applications in Applied Sciences and Mathematics Attended, 30 Mar 2022 to 31 Mar 2022 |
[2] |
International Conference on Computing Paradigms Attended, 17 Dec 2021 to 18 Dec 2021 |
[3] |
International Conference on Computing Paradigms Attended, 30 Aug 2019 to 31 Aug 2019 |
Awards & Honors
[1] |
International Award for Academic Excellence Award 2024 INTERNATIONAL INSTITUTE OF ORGANIZED RESEARCH (I2OR) - Oct 2024 |
[2] |
International Award for Outstanding Teachers 2023 INTERNATIONAL INSTITUTE OF ORGANIZED RESEARCH (I2OR) - Jul 2023 |

Ms. P RANJANI MCA.,
Assistant Professor

Ms. J SANJANA M.C.A.,
Assistant Professor
Events
General | 19-04-2025 | Venue: Sri Roop Rajat Seminar Hall
Placement & Career Guidance Cell - Placement Achievers Day on 19.04.2025General | 08-04-2025 | Venue: Sri Roop Rajat Seminar Hall
Placement and Career Guidance Cell - On-Campus Drive with Bharath International Senior Secondary School, Krishnagiri.Seminars & Workshops | 07-04-2025 | Venue: Sri Arihanth Block – Seminar Hall
Research and Development Cell - One Day Seminar on Manuscript Writing -07.04.2025General | 01-04-2025 | Venue: MKJC Campus
MKJC is conducting Sports Quota Selection Trials 2025-26 on 01.04.2025General | 26-03-2025 | Venue: Sri Roop Rajat Seminar Hall
Placement and Career Guidance Cell is - an On-Campus Drive with First Source - 26.03.2025General | 14-03-2025 | Venue: Sri Roop Rajat Seminar Hall
Placement & Career Guidance Cell - Virtual Campus Drive with Rinex Technologies Pvt Ltd -14.03.2025General | 11-03-2025 | Venue: Sri Roop Rajat Seminar Hall
Placement & Career Guidance Cell - On Campus Drive on Tata Electronics - 11.03.2025General | 10-03-2025 | Venue: Sri Roop Rajat Seminar Hall
Placement & Career Guidance Cell - On Campus Drive on AGS Health, Vellore - 10.03.2025General | 06-03-2025 | Venue: Sri Roop Rajat Seminar Hall
Placement & Career Guidance Cell - On Campus Drive on Quess Corp - 06.03.2025