Message From Dean
Shankara Research Center in Information Sciences (SHREIS) strives to advance knowledge, create, foster and integrate innovation and entrepreneurship by exploring and thinking in terms of “and/both" (Non-Duality) while considering the possibility of “either/or"(Duality).
This is achieved through 
 Integrating graduate education with research: in addition to course work, graduate students actively engage in research throughout their education; each faculty member both teaches and engages  in research
 Establishing interfaces and participation models, research project identification and development mechanisms with industry and other research establishments
 Engaging in high impact research themes and problems through multiple collaborative projects

The current areas of Research @ SHRIES include:

Data Mining
Data Mining a very active research area with many successful real-world applications is about developing concepts and methods to extract information from existing datasets and databases, and thereby leading to development and deployment of intelligent decision support systems for decision making in science, industry, government business etc.
At SHRIES research in Data Mining is towards the development of new data mining tools combining traditional and new methods of information processing.

Image Classification
SHRIES is also engaged in Image Processing and Pattern Recognition for various types of data classification, including medical data such as Medical images, using a host of data mining techniques such as Decision Trees (DT’s), Support Vector Machine (SVM), Genetic Algorithms (GAs) / Evolutionary Programming (EP) etc

Network Security
The Mobile Ad Hoc Network is one of the preferred interconnection methods fully adaptable for the emerging world of Ubiquitous Computing. Hence vulnerabilities of protocols, and various attack vectors in wireless adhoc networks have gained the attention of researchers. 
SHRIES has taken up research activities to find solutions for typical Denial of Service (DoS), Impersonation, Eavesdropping, Attacks Against Routing (active routing attacks such as dropping, modification, fabrication, and timing attacks) and develop various Intrusion Detection Techniques as well as propose and test new secure protocols.