Muthu Ramachandran

ORCID: 0000-0002-5303-3100
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Software Engineering Research
  • Advanced Software Engineering Methodologies
  • Software Engineering Techniques and Practices
  • Big Data and Business Intelligence
  • IoT and Edge/Fog Computing
  • Service-Oriented Architecture and Web Services
  • Cloud Data Security Solutions
  • Business Process Modeling and Analysis
  • Blockchain Technology Applications and Security
  • Software System Performance and Reliability
  • Software Reliability and Analysis Research
  • Fuzzy and Soft Set Theory
  • Information and Cyber Security
  • Data Quality and Management
  • E-Government and Public Services
  • Distributed and Parallel Computing Systems
  • Advanced Database Systems and Queries
  • Software Testing and Debugging Techniques
  • Multi-Criteria Decision Making
  • Distributed systems and fault tolerance
  • Information Technology Governance and Strategy
  • Technology Adoption and User Behaviour
  • Scientific Computing and Data Management
  • Model-Driven Software Engineering Techniques

Tech4i2
2023-2024

University of South Africa
2024

Institute of Development Studies
2023

University of Southampton
2023

Leeds Beckett University
2012-2022

Integrated Environmental Solutions (United Kingdom)
2021

Sathyabama Institute of Science and Technology
2018

Indian Space Research Organisation
2005-2016

Philips (United Kingdom)
1995-2002

Liverpool John Moores University
2002

Offering real-time data security for petabytes of is important cloud computing. A recent survey on states that the users' has highest priority as well concern. We believe this can only be able to achieve with an approach systematic, adoptable and well-structured. Therefore, paper developed a framework known Cloud Computing Adoption Framework (CCAF) which been customized securing data. This explains overview, rationale components in CCAF protect security. illustrated by system design based...

10.1109/tsc.2015.2491281 article EN IEEE Transactions on Services Computing 2015-10-15

10.1016/j.ijinfomgt.2016.03.005 article EN International Journal of Information Management 2016-04-09

10.1016/j.ijinfomgt.2015.09.008 article EN International Journal of Information Management 2015-10-20

Network function virtualization (NFV) is a promising technique aimed at reducing capital expenditures (CAPEX) and operating (OPEX), improving the flexibility scalability of an entire network. In contrast to traditional dispatching, NFV can separate network functions from proprietary infrastructure gather these into resource pool that efficiently modify adjust service chains (SFCs). However, this emerging has some challenges. A major problem reliability, which involves ensuring availability...

10.1109/access.2018.2815614 article EN cc-by-nc-nd IEEE Access 2018-01-01

10.1016/j.ijinfomgt.2016.03.008 article EN International Journal of Information Management 2016-04-03

Financialization has contributed to economic growth but caused scandals, misselling, rogue trading, tax evasion, and market speculation. To a certain extent, it also created problems in social instability. It is an important aspect of Enterprise Security, Privacy, Risk (ESPR), particularly risk research analysis. In order minimize the damaging impacts by lack regulatory compliance, governance, ethical responsibilities, trust, we propose Business Integrity Modeling Analysis (BIMA) framework...

10.3390/app10093145 article EN cc-by Applied Sciences 2020-04-30

This paper describes an ongoing process to define a suitable improvement model for story cards based requirement engineering and practices at agile software development environments. Key features of the SMM (Story card Maturity Model) are: solves problems related like requirements conflicts, missing requirements, ambiguous standard structure cards, address nonfunctional from exploration phase, use simplified tailored assessment method on CMM, which is poorly addressed CMM. CMM does not cover...

10.4304/jsw.4.5.422-435 article EN Journal of Software 2009-07-01

The offshore/onsite teams' effectiveness of knowledge transfer is significantly measured by various kinds factors. In this paper, we propose a (KT) assessment framework which integrates four criteria for evaluating the KT GSD teams. These are: knowledge, team, technology, and organisation context, present fuzzy DEMATEL approach assessing teams based on intuitionistic numbers (IFNs). approach, decision makers provide their subjective judgments criteria, characterised basis sets. Moreover,...

10.1504/ijica.2015.073006 article EN International Journal of Innovative Computing and Applications 2015-01-01

Artificial Intelligence (AI) has impacted global economy, workforce productivity, smart health, cities, transport, and much more to come. Large Language Models (LLM) such as ChatGPT Google?s Gemini, have been widely adopted in various applications. Blockchain Technology stands a towering disruptor today's tech landscape, offering assurances of enhanced security scalability for Within the realm healthcare, its adoption surged, spanning from streamlined recordkeeping bolstered clinical trials,...

10.2298/fuee2401169r article EN cc-by-nc-nd Facta universitatis - series Electronics and Energetics 2024-01-01

The paper describes an ongoing project to define a suitable process model for software improvement in small medium organizations. This is being carried out as collaborative between Leeds Metropolitan University and four companies who are currently implementing SP1 programs. Key features of the PRISMS are: explicitly relating goals business goals, which used choose prioritize key areas improvement; use simplified tailorable assessment method based on CMM (Paulk et al., 1995); definition...

10.1109/qsic.2003.1319105 article EN 2003-01-01

Blockchain applications in healthcare have grown rapidly and it includes record keeping, clinical trials, medical supply chains, patient monitoring, etc. where characteristics are needed to improve safety, privacy, security. Technology is one of the biggest disruptive technologies today. However, Porru, et. al (2017) reported lacks processes, tools, techniques. Therefore, this paper provides a systematic framework for secure sustainable software engineering blockchain applications. Secure...

10.30953/bhty.v6.286 article EN cc-by-nc Blockchain in Healthcare Today 2023-12-22
Coming Soon ...