Marimuthu Palaniswami

ORCID: 0000-0002-3635-4252
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Heart Rate Variability and Autonomic Control
  • EEG and Brain-Computer Interfaces
  • Non-Invasive Vital Sign Monitoring
  • ECG Monitoring and Analysis
  • Anomaly Detection Techniques and Applications
  • Neural Networks and Applications
  • Energy Efficient Wireless Sensor Networks
  • Blind Source Separation Techniques
  • Adaptive Control of Nonlinear Systems
  • Balance, Gait, and Falls Prevention
  • Obstructive Sleep Apnea Research
  • Cardiac electrophysiology and arrhythmias
  • IoT and Edge/Fog Computing
  • Face and Expression Recognition
  • Gait Recognition and Analysis
  • Network Security and Intrusion Detection
  • Control Systems and Identification
  • Iterative Learning Control Systems
  • Phonocardiography and Auscultation Techniques
  • Video Surveillance and Tracking Methods
  • Time Series Analysis and Forecasting
  • Muscle activation and electromyography studies
  • Neonatal and fetal brain pathology
  • Advanced Clustering Algorithms Research
  • Advanced Control Systems Optimization

The University of Melbourne
2016-2025

Deakin University
2015-2023

Indian Institute of Technology Kharagpur
2021

Central Tuber Crops Research Institute
1993-2020

Canadian Standards Association
2019

Institute of Electrical and Electronics Engineers
2004-2017

Khalifa University of Science and Technology
2015

Northwestern Polytechnical University
2009-2011

Australian National University
2009

Nanjing University of Science and Technology
2008

Increasing population density in urban centers demands adequate provision of services and infrastructure to meet the needs city inhabitants, encompassing residents, workers, visitors. The utilization information communications technologies achieve this objective presents an opportunity for development smart cities, where management citizens are given access a wealth real-time about environment upon which base decisions, actions, future planning. This paper framework realization cities...

10.1109/jiot.2013.2296516 article EN IEEE Internet of Things Journal 2014-01-31

Heart rate variability (HRV) is concerned with the analysis of intervals between heartbeats. An emerging technique Poincaré plot, which takes a sequence and plots each interval against following interval. The geometry this plot has been shown to distinguish healthy unhealthy subjects in clinical settings. valuable HRV due its ability display nonlinear aspects sequence. problem is, how do we quantitatively characterize capture useful summary descriptors that are independent existing measures?...

10.1109/10.959330 article EN IEEE Transactions on Biomedical Engineering 2001-01-01

Very large (VL) data or big are any that you cannot load into your computer's working memory. This is not an objective definition, but a definition easy to understand and one practical, because there dataset too for computer might use; hence, this VL you. Clustering of the primary tasks used in pattern recognition mining communities search databases (including images) various applications, so, clustering algorithms scale well important useful. paper compares efficacy three different...

10.1109/tfuzz.2012.2201485 article EN IEEE Transactions on Fuzzy Systems 2012-05-29

Ageing influences gait patterns causing constant threats to control of locomotor balance. Automated recognition changes has many advantages including, early identification at-risk and monitoring the progress treatment outcomes. In this paper, we apply an artificial intelligence technique [support vector machines (SVM)] for automatic young-old types from their respective gait-patterns. Minimum foot clearance (MFC) data 30 young 28 elderly participants were analyzed using a PEAK-2D motion...

10.1109/tbme.2005.845241 article EN IEEE Transactions on Biomedical Engineering 2005-04-19

<para xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> Obstructive sleep apnea syndrome (OSAS) is associated with cardiovascular morbidity as well excessive daytime sleepiness and poor quality of life. In this study, we apply a machine learning technique [support vector machines (SVMs)] for automated recognition OSAS types from their nocturnal ECG recordings. A total 125 sets recordings acquired normal subjects (OSAS<formula formulatype="inline"><tex...

10.1109/titb.2008.2004495 article EN IEEE Transactions on Information Technology in Biomedicine 2008-08-19

Fog/Edge computing emerges as a novel paradigm that harnesses resources in the proximity of Internet Things (IoT) devices so that, alongside with cloud servers, provide services timely manner. However, due to ever-increasing growth IoT resource-hungry applications, fog/edge servers limited cannot efficiently satisfy requirements applications. Therefore, application placement environment, which several distributed and centralized are available, is challenging issue. In this article, we...

10.1109/tmc.2020.2967041 article EN IEEE Transactions on Mobile Computing 2020-01-15

Anomaly detection in wireless sensor networks is an important challenge for tasks such as fault diagnosis, intrusion detection, and monitoring applications. The algorithms developed anomaly have to consider the inherent limitations of their design so that energy consumption nodes minimized lifetime network maximized. In this survey article we analyze state art techniques discuss some open issues research.

10.1109/mwc.2008.4599219 article EN IEEE Wireless Communications 2008-08-01

For constrained end devices in Internet of Things, such as smart meters (SMs), data transmission is an energy-consuming operation. To address this problem, we propose efficient and privacy-preserving aggregation system with the aid Fog computing architecture, named PPFA, which enables intermediate nodes to periodically collect from nearby SMs accurately derive aggregate statistics fine-grained level aggregation. The Cloud/utility supplier computes overall by aggregating minimize privacy...

10.1109/tii.2018.2803782 article EN IEEE Transactions on Industrial Informatics 2018-02-08

In this paper, we develop a physiological oscillator model of which the output mimics shape R-R interval Poincaré plot. To validate model, simulations various nervous conditions are compared with heart rate variability (HRV) data obtained from subjects under each prescribed condition. For variety sympathovagal balances, our generates plots that undergo alterations strongly resembling those actual intervals. By exploiting basis detail way low- and high-frequency modulation sinus node...

10.1152/ajpheart.00405.2000 article EN AJP Heart and Circulatory Physiology 2002-11-01

Identifying misbehaviors is an important challenge for monitoring, fault diagnosis and intrusion detection in wireless sensor networks. A key problem how to minimize the communication overhead energy consumption network when identifying misbehaviors. Our approach this based on a distributed, cluster-based anomaly algorithm. We by clustering measurements merging clusters before sending description of other nodes. In order evaluate our distributed scheme, we implemented algorithm simulation...

10.1109/iccs.2006.301508 article EN 2006-01-01

We propose a new algorithm for the incremental training of support vector machines (SVMs) that is suitable problems sequentially arriving data and fast constraint parameter variation. Our method involves using "warm-start" SVMs, which allows us to take advantage natural properties standard active set approach linearly constrained optimization problems. Incremental quickly retraining machine after adding small number additional vectors an existing (trained) machine. Similarly, problem...

10.1109/tnn.2004.836201 article EN IEEE Transactions on Neural Networks 2005-01-01

Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect network from its central base station. In this paper, we present method intrusion detection in wireless Our scheme uses clustering algorithm build model of normal traffic behavior, then detect abnormal patterns. A key advantage our approach that it able not previously been seen. Moreover, based on set features can potentially be applied wide range...

10.1080/15501320600692044 article EN International Journal of Distributed Sensor Networks 2006-10-01

A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy-efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting packets may help to prevent jammer from taking actions based on content packets, but temporal arrangement induced nature protocol might unravel patterns that take advantage of, even when are encrypted. By looking at packet interarrival times in three representative MAC protocols, S-MAC,...

10.1145/1464420.1464426 article EN ACM Transactions on Sensor Networks 2009-02-01

Anomaly detection is an important challenge for tasks such as fault diagnosis and intrusion in energy constrained wireless sensor networks. A key problem how to minimise the communication overhead network while performing in-network computation when detecting anomalies. Our approach this based on a formulation that uses distributed, one-class quarter-sphere support vector machines identify anomalous measurements data. We demonstrate using data from Great Duck Island Project our distributed...

10.1109/icc.2007.637 article EN IEEE International Conference on Communications 2007-06-01

Poincaré plot is one of the important techniques used for visually representing heart rate variability. It valuable due to its ability display nonlinear aspects data sequence. However, problem lies in capturing temporal information quantitatively. The standard descriptors quantifying (SD1, SD2) measure gross variability time series data. Determination advanced methods properties pose a significant challenge. In this paper, we propose novel descriptor "Complex Correlation Measure (CCM)"...

10.1186/1475-925x-8-17 article EN cc-by BioMedical Engineering OnLine 2009-01-01

Anomaly detection in wireless sensor networks is an important challenge for tasks such as intrusion and monitoring applications. This paper proposes two approaches to detecting anomalies from measurements networks. The first approach a linear programming-based hyperellipsoidal formulation, which called centered support vector machine (CESVM). While this CESVM has advantages terms of its flexibility the selection parameters computational complexity, it limited scope distributed implementation...

10.1109/tifs.2010.2051543 article EN IEEE Transactions on Information Forensics and Security 2010-06-16

Obstructive sleep apnea or hypopnea causes a pause reduction in airflow with continuous breathing effort. The aim of this study is to identify individual and events from normal using wavelet-based features 5-s ECG signals (sampling rate = 250 Hz) estimate the surrogate index (AI)/hypopnea (HI) (AHI). Total 82,535 epochs (each duration) during sleep, 1638 689 events, 3151 1862 were collected 17 patients training set. Two-staged feedforward neural network model was trained...

10.1109/titb.2009.2031639 article EN IEEE Transactions on Information Technology in Biomedicine 2009-09-24

Cardiac autonomic neuropathy (CAN) in diabetes has been called a "silent killer", because so few patients realize that they suffer from it, and yet its effect can be lethal. Early sub clinical detection of CAN intervention are prime importance for risk stratification preventing sudden death due to silent myocardial infarction. This study presents the usefulness heart rate variability (HRV) complexity analyses short term ECG recordings as screening tool CAN. A total 17 sets during supine rest...

10.1186/1475-925x-8-3 article EN cc-by BioMedical Engineering OnLine 2009-01-01

Security of wireless sensor networks (WSN) is an important research area in computer and communications sciences. Anomaly detection a key challenge ensuring the security WSN. Several anomaly algorithms have been proposed validated recently using labeled datasets that are not publicly available. Our group ellipsoid-based algorithm but demonstrated its performance synthetic real Intel Berkeley Research Laboratory Grand St. Bernard which with anomalies. This approach requires manual assignment...

10.1109/issnip.2010.5706782 article EN 2010-12-01
Coming Soon ...