Mahalingam Ramkumar

ORCID: 0000-0003-3183-0165
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Security in Wireless Sensor Networks
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Cryptography and Data Security
  • Mobile Ad Hoc Networks
  • Digital Media Forensic Detection
  • Security and Verification in Computing
  • Blockchain Technology Applications and Security
  • Cloud Data Security Solutions
  • Advanced Authentication Protocols Security
  • Cryptographic Implementations and Security
  • Opportunistic and Delay-Tolerant Networks
  • Salmonella and Campylobacter epidemiology
  • Antibiotic Resistance in Bacteria
  • Animal Nutrition and Physiology
  • Cooperative Communication and Network Coding
  • Gut microbiota and health
  • Internet Traffic Analysis and Secure E-voting
  • Distributed systems and fault tolerance
  • Digital Rights Management and Security
  • Probiotics and Fermented Foods
  • Advanced Data Compression Techniques
  • Access Control and Trust
  • Genetics, Bioinformatics, and Biomedical Research
  • Zoonotic diseases and public health

Mississippi State University
2012-2024

Carnegie Foundation for the Advancement of Teaching
2009

New Jersey Institute of Technology
1999-2002

Integrated Device Technology (United States)
2001

During the recent decade, two variants of evolving computing networks have augmented Internet: (i) The Internet Things (IoT) and (ii) Blockchain Network(s) (BCNs). IoT is a network heterogeneous digital devices embedded with sensors software for various automation monitoring purposes. A Network broadcast nodes provisioned validating transactions recording “well-formed” in unique data storage called blockchain ledger. power that (ideally) every node maintains its own copy ledger takes part...

10.3390/network3010006 article EN cc-by Network 2023-01-24

We introduce hashed random preloaded subsets (HARPS), a highly scalable key predistribution (KPD) scheme employing only symmetric cryptographic primitives. HARPS is ideally suited for resource constrained nodes that need to operate extended periods without active involvement of trusted authority (TA), as usually the case forming ad hoc networks (AHNs). HARPS, probabilistic KPD scheme, generalization two other KPDs. The first, (RPSs), based on intersection keys in nodes. second, proposed by...

10.1109/jsac.2004.842555 article EN IEEE Journal on Selected Areas in Communications 2005-03-01

Salmonella spp., a leading cause of foodborne illness, is formidable global menace due to escalating antimicrobial resistance (AMR). The evaluation minimum inhibitory concentration (MIC) for antimicrobials critical characterizing AMR. current whole genome sequencing (WGS)-based approaches predicting MIC are hindered by both computational and feature identification constraints. We propose an innovative methodology called the “Genome Feature Extractor Pipeline” that integrates traditional...

10.3390/microorganisms12010134 article EN cc-by Microorganisms 2024-01-10

In this paper, we present an information-theoretic approach to obtain estimate of the number bits that can be hidden in still images, or, capacity data-hiding channel.We show how addition message signal or signature a suitable transform domain rather than spatial significantly increase channel capacity. Most state-of-the-art schemes developed thus far for have embedded some domain, as it has always been implicitly understood decomposition would help. Though most methods reported literature...

10.1109/83.935040 article EN IEEE Transactions on Image Processing 2001-01-01

Robustness to compression is a basic requirement for any data hiding scheme. We concentrate on MP3 resistant oblivious hiding. First the algorithm briefly introduced. then propose three effective schemes, where message embedded in amplitude, DFT phase domain, and noisy components, respectively. All these schemes demonstrate robustness compression.

10.1109/icassp.2001.941182 article EN 2002-11-13

The nature of mobile ad hoc networks (MANET), demands stringent requirements on primitives that could be used to secure such networks. Mobility imposes restrictions memory and processor due limited battery life. warrants schemes operate for extended periods without referring a trusted authority (TA). Additionally, any enabling scheme security should able scale well. We introduce novel key management scheme, RPS - random preloaded subset distribution which satisfies all the above...

10.1109/glocom.2003.1258469 article EN 2004-07-20

A blockchain based system integrity (BCSI) framework for assuring the of information processes is presented. BCSI well suited a broad class large scale real-world systems. Under framework, any I assured by executing finite state machine model in network. The compared and contrasted with Clark-Wilson (CW) model, existing frameworks like Ethereum.

10.23919/jcc.2019.06.001 article EN China Communications 2019-06-01

Due to nutritional benefits and perceived humane ways of treating the animals, demand for antibiotic-free pastured poultry chicken has continued be steadily rise. Despite non-usage antibiotics in broiler production, antibiotic resistance (AR) is reported zoonotic pathogens. However, factors that drive multidrug (MDR) are not well understood. In this study, we used machine learning deep approaches predict farm management practices physicochemical properties feces soil MDR Antibiotic use...

10.3390/microorganisms10091703 article EN cc-by Microorganisms 2022-08-24

We explore the problem of proving ownership or origin multimedia content like image/video audio signals through watermarking. The need for watermarking arises out insufficiency present copyright laws claiming digital content. Watermarking schemes however, are threatened by counterfeit attacks, which primarily use freedom available in choice signature method. A restrictive protocol could go a long way rendering attacks extremely difficult. suggest comprehensive as an extension one suggested...

10.1109/tmm.2004.827494 article EN IEEE Transactions on Multimedia 2004-05-13

Subminimum inhibitory concentrations (sub-MICs) of antibiotics can be therapeutically effective, but the underlying molecular mechanisms are not well-characterized. We analyzed Pasteurella multocida proteome response to sub-MICs amoxicillin, chlortetracycline, and enrofloxacin using isotope-coded affinity tags (ICAT). There were parallel effects on inhibition growth kinetics suppression protein expression by clusters orthologous groups (COG) categories. Potential compensatory enabling...

10.1021/pr050360r article EN Journal of Proteome Research 2006-02-02

Abstract Understanding the growth of bacterial pathogens in a micronutrient restricted host environment can identify potential virulence proteins that help overcome this nutritional barrier to productive infection. In study, we investigated pneumococcal protein expression response iron limitation using an vitro model. We identified S. pneumoniae TIGR4 by 2‐D LC ESI MS/MS and determined significant changes restriction computer‐intensive random resampling methods. Differential was studied...

10.1002/pmic.200701048 article EN PROTEOMICS 2008-05-01

Microbiomes that can serve as an indicator of gut, intestinal, and general health humans animals are largely influenced by food consumed contaminant bioagents. Microbiome studies usually focus on estimating the alpha (within sample) beta (similarity/dissimilarity among samples) diversities. This study took a combinatorial approach applied machine learning to microbiome data predict presence disease-causing pathogens their association with known/potential probiotic taxa. Probiotics beneficial...

10.1186/s42523-023-00260-w article EN cc-by Animal Microbiome 2023-11-15

We present an efficient, scalable, and renewable hierarchical random key predistribution (KPD) scheme as enabler for a low complexity security infrastructure. As the proposed KPD employs only symmetric cryptographic primitives it permits resource constrained nodes to take part in deployment. Further, two need exchange their IDs before they can establish shared secret. The provides scalable different levels of hierarchy depending on available resources. In addition higher are protected from...

10.1109/eit.2005.1626994 article EN IEEE International Conference on Electro Information Technology 2006-05-25

Understanding how multiple features are associated and contribute to a specific objective is as important understanding each feature contributes particular outcome. Interpretability of single in prediction may be handled ways; however, multi-objective prediction, it difficult obtain interpretability combination values. To address this issue, we propose an interaction design using multi-labels find the optimal agricultural settings. One novel aspects identification method that integrates...

10.1109/syscon61195.2024.10553467 article EN 2022 IEEE International Systems Conference (SysCon) 2024-04-15

In this study, we explore how transformer models, which are known for their attention mechanisms, can improve pathogen prediction in pastured poultry farming. By combining farm management practices with microbiome data, our model outperforms traditional methods terms of the F1 score—an evaluation metric performance—thus fulfilling an essential need predictive microbiology. Additionally, emphasis is on making model’s predictions explainable. We introduce a novel approach identifying feature...

10.3390/microorganisms12071274 article EN cc-by Microorganisms 2024-06-23

Conventional communication methods employ a wide variety of signaling techniques that essentially map bit sequence to real-valued (which is representation point in the signal constellation). The turn transmitted over communications channel. However, for purpose multimedia steganography or data hiding have transmit corresponding constellation superimposed on original content (without affecting fidelity noticeably). In this paper, we explore practical solutions steganography. Data seen as...

10.1109/tsp.2004.823468 article EN IEEE Transactions on Signal Processing 2004-03-23

Any key pre-distribution (KPD) scheme is inherently a trade-off between complexity and security. By sacrificing some security (KPD schemes need assurance of the ability to limit sizes attacker coalitions), KPD gain many advantages. We argue that random schemes, in general, perform an "advantageous" which renders them more suitable for practical large scale deployments resource constrained nodes. introduce novel scheme, hashed preloaded subsets (HARPS), turns out be generalization two other...

10.1109/glocom.2004.1378403 article EN 2005-04-05

Animal sourced foods including contaminated poultry meat and eggs contribute to human non-typhoidal salmonellosis, a foodborne zoonosis. Prevalence of Salmonella in pastured production systems can lead contamination the final product. Identification farm practices that affect prevalence is critical for implementing control measures ensure safety these products. In this study, we developed predictive models based predominantly on deep learning approaches identify key pre-harvest management...

10.1016/j.heliyon.2022.e11331 article EN cc-by-nc-nd Heliyon 2022-11-01

Purpose The purpose of this paper is to examine the blockchain as a trusted computing platform. Understanding strengths and limitations platform essential execute large-scale real-world applications in blockchains. Design/methodology/approach This proposes several modifications conventional networks improve scale scope applications. Findings Simple modifications cryptographic protocols for constructing ledgers, digital signatures authentication transactions, are sufficient realize scalable...

10.1108/jcms-05-2018-0020 article EN cc-by Journal of Capital Markets Studies 2018-10-31

In this research, we propose an explanatory model that learns combinations of microbiome signatures help predict reduced multidrug resistance (MDR) disease-causing pathogens. A twin regression network in our provides a means for estimating the MDR presence using samples. Further, extend by backtracking approach determines effect specific on prevalence MDR, to identify potential beneficial combinations. Using high-throughput Illumina sequencing 16SrRNA gene data from 41 pastured poultry...

10.1109/cibcb56990.2023.10264914 article EN 2023-08-29

We present an information-theoretic approach to obtain estimate of the number bits that can be hidden in compressed image sequences. show how addition message signal a suitable transform domain rather than spatial significantly increase data hiding capacity. compare capacities achievable with different block transforms and choice should depend on robustness needed. While it is better choose good energy compaction property (like DCT, wavelet etc.) when required low, poorer Hadamard or Hartley...

10.1109/icassp.1999.757484 article EN 1999-01-01

This paper introduces the measure of information as a new criterion for performance analysis routing algorithms in wireless sensor networks. We argue that since objective network is to estimate two dimensional random field, algorithm must maximize flow about underlying field over lifetime network. develop novel algorithms, MIR (maximum routing) and CMIR (conditional maximum designed flow, present comparison previously proposed algorithm-MREP residual energy path) through simulations. show...

10.1109/glocom.2004.1378059 article EN 2005-04-05
Coming Soon ...