Murugan B S

@kalasalingam.ac.in

Professor
Kalasalingam Academy of Research and Education



              

https://researchid.co/muruganbsm

received the Undergraduate Degree (B.Tech) in Information Technology from Anna University, the Post Graduate degree (M.Tech) in Information Technology from SRM University and Ph.D in Information Technology (Cloud Computing) from Kalasalingam University in June 2017. He has more than 30 publications in National, International Conference and International Journal proceedings. He has 13+ years of teaching experience. His areas of interest include Cloud Computing, Data Science, Operating Systems, and DBMS etc. He is currently working as Deputy Registrar and Senior Associate Professor in the Department of Computer Science and Engineeringat Kalasalingam Academy of Research and Education, Krishnankoil, Tamil nadu, India.

EDUCATION

PhD in Cloud Computing
M.Tech in Information Technology
B.Tech in Information Technology

RESEARCH INTERESTS

Cloud Computing, Data Science, Artificial Intelligence

20

Scopus Publications

455

Scholar Citations

8

Scholar h-index

8

Scholar i10-index

Scopus Publications

  • Ensemble machine learning technique-based plagiarism detection over opinions in social media
    Sethu Vinayaga Vadivu, Palanigurupackiam Nagaraj, and Bagavathi Ammai Shanmugam Murugan

    Informa UK Limited


  • An Exploration of Contagion Infection in Citrus Plant with Augmented Data using ConvNet
    Shanmugapriya. S, Dhanasekaran. S, and Murugan. B. S

    IEEE
    Citrus is widely cultivated and consumed fruit across the global. It gains its popularity from its nutritional benefits. Citrus fruit has gained its international trading due to freshly consumed, processed products, oil production and other by-products. Citrus production is cut short mainly due its diseases. Identifying the diseases at early stage and stepping forward to cure them is vital role in improving the production. Automated disease identification cuts down the manual effort and also improves the efficiency in identification. With various degrees of accuracy, both machine learning and deep learning algorithms have been successful in identifying citrus leaf and fruit diseases. This research study proposes a novel disease classification method using CNN and also provides a comparative study with models like SVM, k-means clustering, ANN and CNN for disease identification.

  • Secure and energy-efficient data transmission framework for IoT-based healthcare applications using EMCQLR and EKECC
    D. Balakrishnan, T. Dhiliphan Rajkumar, S. Dhanasekaran, and B. S. Murugan

    Springer Science and Business Media LLC

  • Regression to Forecast: An In-Play Outcome Prediction for One-Day Cricket Matches
    R. Raja Subramanian, P. Vijaya Karthick, S. Dhanasekaran, R. Raja Sudharsan, S. Hariharasitaraman, S. Rajasekaran, and B. S. Murugan

    Springer Nature Singapore

  • Low Area FPGA Implementation of AES Architecture with EPRNG for IoT Application
    N. Siva Balan and B. S. Murugan

    Springer Science and Business Media LLC

  • An Efficient Pelican optimization based CNN-BiLSTM to Detect and Classify 3D Objects
    Ramana Rajendran and B. S. Murugan

    IEEE
    The lack of appropriate shape representation makes it complex to recognize the 3D shapes accurately and it is a hot topic in the field of Computer Vision (CV). This paper presents a Pelican optimized Convolutional Neural Network (CNN)-Bidirectional Long Short Term Memory (BiLSTM) to recognize the different objects in a particular scene. The CNN-BilSTM architecture is formed by placing two BiLSTM architectures below the CNN network and integrating the outputs via a fully connected layer. The pelican optimization algorithm is mainly incorporated to optimize the different hyperparameters associated with the CNN-BiLSTM architecture such as number of layers, batch size, number of layers, dropout, etc. The experiments are conducted using the ScanNet dataset which comprises both 2D and 3D data along with the labeled voxels. The proposed methodology offers improved results when compared with the existing techniques in terms of confusion matrix, accuracy, precision, and recall.

  • Lightweight Two-Factor Authentication With S-Box Flipping Module for IoT Security
    Sivabalan N. and Murugan B. S.

    IGI Global
    In recent days, the usage of cloud computing in wireless networks offers more advantages to the users by storing resources with less complexity and ease to control. Data security is considered a critical aspect in a cloud computing environment due to the sensitive and confidential information of users stored in IOT. So, this paper introduces a Lightweight and Privacy-Preserving Two-Factor Authentication (TFA) with S-box based Flipping Module (SBFM) to provide data security for a user. The proposed scheme uses Unclonable Function Key (UFK) to provide a better solution for highly-secured cloud computing. Moreover, Reconfigurable Unpredictable Response Value (RURV) helps to generate the different response values for every clock cycle in IoT. Finally, Spartan 6 Field Programmable Gate Array (FPGA) performances of the proposed TFA-RURV-IoT are compared to existing TFA-URV-IoT protocols, whereas the simulation results show that proposed TFA-RURV-IoT achieves better results in terms of LUT, slices and flip flops.

  • Modelling an Adaptive Clustering Model for the Mining Community Using Learning Approaches
    Prathima. Y and B. S. Murugan

    IEEE
    Data clustering is a crucial phase in data analysis, widely concentrated by data mining communities. Many previous algorithms based on data clustering are related to the endless models that look for sparsity and higher dimensional issues and try to avoid the sequence of information and the data structural data. The recurrent and convolutional neural networks work on deep learning-based models concerning the data as sequences. Yet, the explanation of outcomes and the supervised signals are lacking. The adaptive data clustering model (ADCM) technique is proposed in this system to incorporate the pre-trained data encoders into data clustering tasks. This model depends on the representation of a sequence that breaks the dependencies on the supervision. The proposed system provides experimental outcomes that perform better than the traditional data clustering algorithm and the modern data model, pre-trained on the complete datasets. Additionally, the clustering result explains the significant understanding of the deep learning technique principles. The clustering approach proposes the description model that assists the users in understanding the quality and meaning of the outcome of the clustering process.

  • An High Speed Area Efficient Implementation of Prime Field based Twisted Edwards Curve Point Multiplication using FPGA Architecture
    N. Siva Balan and B.S. Murugan

    IEEE
    On the digital side, data transfer is constantly subject to attack. A cypher strength study is an important part of any corporate or academic security assessment. A strong encryption mechanism is required for data security. For secure information transmission, System-On-Chips (SoCs) for Internet of things (IoT) applications require hardware-based coordinated arbitrary number generators. They don’t have a confined hardware and power spending plan, intends to the use of particular Twisted Edwards Curve (TEC). A symmetric encryption with incorporated TEC is proposed in this paper. A regular 40 nm CMOS innovation is utilized to accomplish the proposed plan. The aftereffects of the post-design recreation uncover that it gives great irregularity at a modest energy-per-bit cost. Moreover, the circuit finished all NIST assessments with no post-handling. When contrasted with the conventional encryption, it has an extremely low region increment of just 0.14 percent. As a proof of idea, a FPGA execution is likewise shown, which checks the simulated results. To show the double utilization of the proposed TEC, the Advanced Encryption Standard (AES) key extension method is also evolved. The AES technique depends solely on the substitute-permute network plan rule, and it functions admired in both programming and hardware. The procedure introduced here utilizes a solitary indistinguishable mystery key for encryption and disentangling. It can't be utilized in public sector or private, business, or different projects. The AES calculation is executed on two FPGAs in this research, and it was found that the Spartan-6 FPGA conveys better throughput and lower time delay than FPGA-based IoT gadgets.

  • Intelligent metaheuristic cluster-based wearable devices for healthcare monitoring in telemedicine systems
    S. Dhanasekaran, K. Pradeep Mohan Kumar, A. Sivanesh Kumar, R. Jeya, S. Rajasekaran, B.S. Murugan, and R. Rajasubramanian

    Elsevier

  • Energy efficient resource allocation using hybrid genetic algorithm in cloud


  • Fine grained access control using H-KCABE in cloud storage
    M. Sangeetha, P. Vijayakarthik, S. Dhanasekaran, and B.S. Murugan

    Elsevier BV


  • Brain Tumor Segmentation Using Convolutional Neural Networks in MRI Images
    M. Mohammed Thaha, K. Pradeep Mohan Kumar, B. S. Murugan, S. Dhanasekeran, P. Vijayakarthick, and A. Senthil Selvi

    Springer Science and Business Media LLC

  • Automation of the DSSAT crop growth simulation model
    G. Sachin, J. Mohammed Ahamed, K. Nagajothi, M. Rana, and B. S. Murugan

    Copernicus GmbH
    Abstract. Crop Simulation Models (CSM) simulate the growth, development, and yield of crops using various inputs such as soil water, carbon and nitrogen processes, and management practices. DSSAT (Decision Support System for Agrotechnology Transfer) is a software program that comprises dynamic crop growth simulation models for over 42 crops. It incorporates modules for crop, soil, and weather to simulate long-term outcomes of crop management strategies. DSSAT-CSM requires various data for model operation. This includes data on the site where the model is to be operated, on the daily weather during the growth cycle, on the characteristics of the soil at the beginning of the growing cycle or crop sequence, and on the management of the crop. Acquisition of the data and providing the data to the DSSAT model is tedious and time-consuming as each individual value has to be manually entered. Additionally, crop simulation models can only be run for specific points and not for entire locations. Sometimes site-specific data especially weather data cannot be obtained. The output thus produced is difficult to analyze spatially at a large scale. The main purpose of this paper is to take the required dataset directly from spatial data. This is done by dividing locations into grids and taking the data from each grid. Python scripts are then used to convert this data into crop model format which is then run through DSSAT on an individual basis. The output thus obtained is be entered back into their respective grids as spatial data.

  • Region-based scalable smart system for anomaly detection in pedestrian walkways
    B.S. Murugan, Mohamed Elhoseny, K. Shankar, and J. Uthayakumar

    Elsevier BV

  • Enhanced Map Reduce Techniques for Big Data Analytics based on K-Means Clustering
    S. Dhanasekaran, R. Sundarrajan, B. S. Murugan, S. Kalaivani, and V. Vasudevan

    IEEE
    The Clustering methods have been greatly adopted in various real world data analysis applications, such as customer behavior analysis, medical data analysis, digital forensics, etc. In existing system, MR-mafia subspace clustering algorithm becomes inefficient as well as ineffective because the data size are continuously increasing, and data blocks are overlaying. Big Data environment inherits several knowledge and we extracts the necessary knowledge and K-means clustering algorithm is being designed. This paper focused on K – mean clustering algorithm based on improved map reduce techniques. The algorithm takes advantages to avoid unnecessary input and output data and also used to optimize data storage and also to achieve the out sourcing of data privacy. We have using a medical datasets of this project, and Enhanced map reduce based K – means clustering algorithm have been proposed which work effectively done and that can be outsourced to cloud server.

  • An expert agent based cloud service discovery using elliptic curve cryptography authentication


  • Intelligent scheduling system using agent based resource allocation in cloud
    B. S. Murugan, V. Vasudevan, and B. Ganeshpandi

    IEEE
    In cloud computing resource allocation should be elastic, within the sense that it must have modification accurate and quickly based on the demand. In cloud computing, Virtual machine allocates the resource for user's needs. Some time workload of service, increase rapidly, the existing approaches solve aggressive resource provisioning tasks using SPRNT, but still some challenges occur in VM allocation. Such as, it may fail when faced with rapidly increasing workload, and the user can't commit with a virtual machine that which one is adapted to the task, then increases in adaptation time and memory access time. In this paper, we proposed agent based resource allocation for intelligent scheduling system. Agent based resource allocation should help users to verify the most effective framework for every individual. It provides a high level of flexibility, balance workload, reduce adaptation time and memory access time. The evaluation result of agent based resource allocation to achieve up to 4.3x speed up in adaptation time.

RECENT SCHOLAR PUBLICATIONS

  • A novel image denoising algorithm based on least square generative adversarial network
    SW Mohammed, B Murugan
    Journal of Real-Time Image Processing 21 (3), 79 2024

  • 一种针对盲图像质量评估的多模态密集卷积网络
    N CHOCKALINGAM, B MURUGAN, AN CHOCKALINGAM, ...
    Frontiers 24 (11), 1601-1615 2023

  • A multimodal dense convolution network for blind image quality assessment
    N Chockalingam, B Murugan
    Frontiers of Information Technology & Electronic Engineering 24 (11), 1601-1615 2023

  • Secure and energy-efficient data transmission framework for IoT-based healthcare applications using EMCQLR and EKECC
    D Balakrishnan, TD Rajkumar, S Dhanasekaran, BS Murugan
    Cluster Computing, 1-18 2023

  • A novel model for eliminating overlapping issues in 3D object recognition using dove swarm optimization based light GBM
    R Rajendran, BS Murugan
    International Journal of Information Technology 15 (5), 2387-2393 2023

  • Medical image encryption using random grid based diffusion
    D Manivannan, B Murugan
    AIP Conference Proceedings 2724 (1) 2023

  • Image Encryption Using Chaos Based Heuristic Diffusion
    D Manivannan, B Murugan
    SN Computer Science 4 (3), 239 2023

  • Development and evaluation of millet based spray dried probiotic health mix
    KVP Kumar, B Murugan
    2023

  • Regression to Forecast: An In-Play Outcome Prediction for One-Day Cricket Matches
    R Raja Subramanian, P Vijaya Karthick, S Dhanasekaran, ...
    Proceedings of the International Conference on Cognitive and Intelligent 2023

  • An Efficient Pelican optimization based CNN-BiLSTM to Detect and Classify 3D Objects
    R Rajendran, BS Murugan
    2022 International Conference on Knowledge Engineering and Communication 2022

  • YOLOv4Tiny: Bearing Angle Based Pose Estimation and Semantic Segmentation For 3D Object Detection From LiDAR Point Cloud & RGB-D Data
    R Rajendran, BS Murugan
    2022

  • Low area FPGA implementation of AES architecture with EPRNG for IoT application
    N Siva Balan, BS Murugan
    Journal of Electronic Testing 38 (2), 181-193 2022

  • Handwritten Digit Recognition Using Neural Network with Gabor Filter for Information Fusion
    A Kumar, B Murugan
    International Conference on Machine Learning and Big Data Analytics, 411-421 2022

  • Improving the security of the organization from the shadow IoT using Blow-fish encryption algorithm
    S Senthilkumar, M Murugan
    Proceedings of The International Halal Science and Technology Conference 14 2022

  • Enhancing The Security Of An Organization From Shadow Iot Devices Using Blow-Fish Encryption Standard
    M Senthilkumar, BS Murugan
    Acta Informatica Malaysia (AIM) 6 (1), 22-24 2022

  • Lightweight Two-Factor Authentication With S-Box Flipping Module for IoT Security
    N Sivabalan, BS Murugan
    International Journal of e-Collaboration (IJeC) 18 (1), 1-24 2022

  • Intelligent metaheuristic cluster-based wearable devices for healthcare monitoring in telemedicine systems
    S Dhanasekaran, KPM Kumar, AS Kumar, R Jeya, S Rajasekaran, ...
    Wearable Telemedicine Technology for the Healthcare Industry, 109-122 2022

  • Detection of Multiple Small 3D Objects Using Point Cloud Images by ASP Network 3D Object Detection Model
    R Ramana, BS Murugan
    Design Engineering, 1924-1940 2021

  • SECURED AND RELIABLE DATA COMMUNICATION IN INTERNET OF THINGS.
    D Balakrishnan, TD Rajkumar, S Dhanasekaran, BS Murugan
    Turkish Online Journal of Qualitative Inquiry 12 (10) 2021

  • Adaptive learning management expert system with evolving knowledge base and enhanced learnability
    S Sridharan, D Saravanan, AK Srinivasan, B Murugan
    Education and Information Technologies 26 (5), 5895-5916 2021

MOST CITED SCHOLAR PUBLICATIONS

  • Brain tumor segmentation using convolutional neural networks in MRI images
    MM Thaha, KPM Kumar, BS Murugan, S Dhanasekeran, P Vijayakarthick, ...
    Journal of medical systems 43, 1-10 2019
    Citations: 163

  • Region-based scalable smart system for anomaly detection in pedestrian walkways
    BS Murugan, M Elhoseny, K Shankar, J Uthayakumar
    Computers & Electrical Engineering 75, 146-160 2019
    Citations: 103

  • Image encryption scheme based on block‐based confusion and multiple levels of diffusion
    B Murugan, AG Nanjappa Gounder
    IET Computer Vision 10 (6), 593-602 2016
    Citations: 61

  • A hybrid image encryption algorithm using chaos and Conway's game‐of‐life cellular automata
    B Murugan, AG Nanjappa Gounder, S Manohar
    Security and Communication Networks 9 (7), 634-651 2016
    Citations: 20

  • Improved real‐time permission based malware detection and clustering approach using model independent pruning
    J Thiyagarajan, A Akash, B Murugan
    IET Information Security 14 (5), 531-541 2020
    Citations: 16

  • Brain tumor segmentation using convolutional neural networks in MRI images
    TM Mohammed, K Pradeep, M Kumar, BS Murugan, S Dhanasekeran, ...
    Journal of medical systems 43 (9), 294 2019
    Citations: 15

  • Adaptive learning management expert system with evolving knowledge base and enhanced learnability
    S Sridharan, D Saravanan, AK Srinivasan, B Murugan
    Education and Information Technologies 26 (5), 5895-5916 2021
    Citations: 13

  • A chaotic image encryption scheme with complex diffusion matrix for plain image sensitivity
    J Thiyagarajan, B Murugan, NGA Gounden
    Serbian Journal of Electrical Engineering 16 (2), 247-265 2019
    Citations: 12

  • A survey of resource discovery approaches in distributed computing environment
    BS Murugan, D Lopez
    International Journal of Computer Applications 22 (9), 44-46 2011
    Citations: 8

  • Enhanced Map Reduce Techniques for Big Data Analytics based on K-Means Clustering
    S Dhanasekaran, R Sundarrajan, BS Murugan, S Kalaivani, V Vasudevan
    2019 IEEE International Conference on Intelligent Techniques in Control 2019
    Citations: 7

  • WITHDRAWN: threshold secret sharing and multi-authority based data access control in cloud computing
    K Suresha, P Vijayakarthick, S Dhanasekaran, BS Murugan
    Materials Today: Proceedings 2021
    Citations: 6

  • Fine grained access control using H-KCABE in cloud storage
    M Sangeetha, P Vijayakarthik, S Dhanasekaran, BS Murugan
    Materials Today: Proceedings 37, 2735-2737 2021
    Citations: 5

  • Spatial big data analytics of influenza epidemic in Vellore, India. 796In: 2014 IEEE international conference on big data (Big Data)
    D Lopez, M Gunasekaran, BS Murugan, H Kaur, KM Abbas
    IEEE 2014
    Citations: 5

  • Intelligent scheduling system using agent based resource allocation in cloud
    BS Murugan, V Vasudevan, B Ganeshpandi
    2016 International Conference on Electrical, Electronics, and Optimization 2016
    Citations: 4

  • Intelligent Scheduling System for Dynamic Resource Allocation in Cloud Computing
    MBS Saranya.S
    International Journal of Advanced Research in Computer Science & Technology 2014
    Citations: 4

  • A novel model for eliminating overlapping issues in 3D object recognition using dove swarm optimization based light GBM
    R Rajendran, BS Murugan
    International Journal of Information Technology 15 (5), 2387-2393 2023
    Citations: 3

  • Secure and energy-efficient data transmission framework for IoT-based healthcare applications using EMCQLR and EKECC
    D Balakrishnan, TD Rajkumar, S Dhanasekaran, BS Murugan
    Cluster Computing, 1-18 2023
    Citations: 2

  • Low area FPGA implementation of AES architecture with EPRNG for IoT application
    N Siva Balan, BS Murugan
    Journal of Electronic Testing 38 (2), 181-193 2022
    Citations: 2

  • Intelligent metaheuristic cluster-based wearable devices for healthcare monitoring in telemedicine systems
    S Dhanasekaran, KPM Kumar, AS Kumar, R Jeya, S Rajasekaran, ...
    Wearable Telemedicine Technology for the Healthcare Industry, 109-122 2022
    Citations: 2

  • Automation of the DSSAT crop growth simulation model
    G Sachin, J Mohammed Ahamed, K Nagajothi, M Rana, BS Murugan
    The International Archives of the Photogrammetry, Remote Sensing and Spatial 2019
    Citations: 2