Balamurugan Balusamy

ORCID: 0000-0003-2805-4951
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Cloud Data Security Solutions
  • Cryptography and Data Security
  • Cloud Computing and Resource Management
  • Artificial Intelligence in Healthcare
  • Network Security and Intrusion Detection
  • Big Data and Business Intelligence
  • Privacy-Preserving Technologies in Data
  • Energy Efficient Wireless Sensor Networks
  • Reproductive Physiology in Livestock
  • Internet of Things and AI
  • Access Control and Trust
  • Advanced Malware Detection Techniques
  • COVID-19 diagnosis using AI
  • Reproductive Biology and Fertility
  • Sperm and Testicular Function
  • Traffic Prediction and Management Techniques
  • Anomaly Detection Techniques and Applications
  • Brain Tumor Detection and Classification
  • Online Learning and Analytics
  • Smart Agriculture and AI
  • Advanced Authentication Protocols Security
  • Mobile Ad Hoc Networks
  • User Authentication and Security Systems

Shiv Nadar University
2022-2025

Saveetha University
2017-2025

Galgotias University
2017-2024

Amity University
2024

Reliance Industries (United States)
2024

Vellore Institute of Technology University
2008-2024

Bharathiar University
2015-2024

Perdana University
2024

Institute of Engineering
2024

Bhavnagar University
2023

Software-Defined Network (SDN) has become a promising network architecture in current days that provide operators more control over the infrastructure. The controller, also called as operating system of SDN, is responsible for running various applications and maintaining several services functionalities. Despite all its capabilities, introduction architectural entities SDN poses many security threats potential targets. Distributed Denial Services (DDoS) rapidly growing attack tremendous...

10.1109/access.2020.3009733 article EN cc-by IEEE Access 2020-01-01

Abstract The consumption of water constitutes the physical health most living species and hence management its purity quality is extremely essential as contaminated has to potential create adverse environmental consequences. This creates dire necessity measure, control monitor water. primary contaminant present in Total Dissolved Solids (TDS), which hard filter out. There are various substances apart from mere solids such potassium, sodium, chlorides, lead, nitrate, cadmium, arsenic other...

10.1038/s41598-024-56775-y article EN cc-by Scientific Reports 2024-03-29

Abstract Industrial advancements and utilization of large amount fossil fuels, vehicle pollution, other calamities increases the Air Quality Index (AQI) major cities in a drastic manner. Major AQI analysis is essential so that government can take proper preventive, proactive measures to reduce air pollution. This research incorporates artificial intelligence prediction based on pollution data. An optimized machine learning model which combines Grey Wolf Optimization (GWO) with Decision Tree...

10.1038/s41598-024-54807-1 article EN cc-by Scientific Reports 2024-03-21

Internet of Things (IoT) is a domain wherein which the transfer data taking place every single second. The security these challenging task; however, challenges can be mitigated with cryptography and steganography techniques. These techniques are crucial when dealing user authentication privacy. In proposed work, elliptic Galois protocol introduced discussed. this protocol, technique used to encrypt confidential that came from different medical sources. Next, Matrix XOR encoding embed...

10.1109/tsmc.2019.2903785 article EN IEEE Transactions on Systems Man and Cybernetics Systems 2019-03-27

Existing routing protocols for wireless sensor networks (WSNs) focus primarily either on energy efficiency, quality of service (QoS), or security issues. However, a more holistic view WSNs is needed, as many applications require both QoS and guarantees along with the requirement prolonging lifetime network. The limited capacity nodes forces tradeoff to be made between network lifetime, QoS, security. To address these issues, an ant colony optimization based aware balancing secure (QEBSR)...

10.1109/tem.2019.2953889 article EN IEEE Transactions on Engineering Management 2019-11-28

Electronic health records (EHRs) are information of patients that saved digitally in a network. Various opportunities to enhance patient care, performance measures clinical practice and contribute research the future provided by EHRs. The schemes used store EHRs have been very insecure present era smart cities homes. data can be easily breached hackers unauthorized external parties. Also, is not accessible care providers. These unable create balance between security accessibility. But...

10.1016/j.procs.2020.06.021 article EN Procedia Computer Science 2020-01-01

Speech disorders have turned out a great brunt on the ability of speech. The persons speech were struggling with communication and emotional expressions. proposed work detects classifies using combined CNN SVM techniques. To improve prediction accuracy model, we use Fruitfly optimization algorithm for improving convergence rate results. study mainly focuses young people in which are prevalent. machine is utilized to predict person has healthy or pathological voice accurately.

10.1109/iccit58132.2023.10273910 article EN 2023-09-13

The demand for real-time, high-quality services (QoS) is increasing with the proliferation of resource-constrained nature edge devices that facilitate Internet Things (IoT) and wireless sensor network (WSN) applications. Several existing multi-objective algorithms, such as MOPSO, Elitism MOGA, MODE, others, are capable balancing exploration exploitation; they assist in efficient QoS management WSN-IoT applications, address resource limitations, align objectives However, suffer from showing...

10.1109/tce.2025.3526992 article EN IEEE Transactions on Consumer Electronics 2025-01-01

Artificial Intelligence techniques are being used to analyse vast amounts of medical data and assist in the accurate early diagnosis diseases. The common brain related diseases faced by most people which affects structure function brain. neural networks have been extensively for disease prediction due their ability learn complex patterns relationships from large datasets. However, there some problems like over-fitting, under-fitting, vanishing gradient increased elapsed time occurred course...

10.1038/s41598-024-82838-1 article EN cc-by-nc-nd Scientific Reports 2025-01-07

Wireless sensor network (WSN) is considered as the resource constraint network, in which entire nodes have limited resources. In WSN, prolonging lifetime of remains unsolved point. Accordingly, this study intends to propose a hybrid GGWSO (Grouped Grey Wolf Search Optimisation) algorithm improve performance cluster head selection so that network's can be extended. The proposed method concerns main constraints associated with distance, delay, energy, and security. This compares several...

10.1049/iet-wss.2018.5008 article EN IET Wireless Sensor Systems 2018-09-25

In today's era drones and UAV are being used more for spying warfare. Their excessive use makes them vulnerable to be hacked malicious purposes. There also security loopholes in this technology like the radio waves which can exploited by rivals cause a large amount of destruction or loss data. This paper is written improve using blockchain technology. Blockchain highly secured as it uses private key cryptography peer network. By incorporating transmitting signals from controller drone UAV,...

10.1109/confluence.2019.8776613 article EN 2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) 2019-01-01

Coronavirus is a large family of viruses that affects humans and damages respiratory functions ranging from cold to more serious diseases such as ARDS SARS. But the most recently discovered virus causes COVID-19. Isolation at home or hospital depends on one’s health history conditions. The prevailing disease might get instigated due existence lead deterioration in health. Therefore, there need for early detection virus. Recently, many works are found be observed with deployment techniques...

10.1155/2022/2110785 article EN Mobile Information Systems 2022-06-28
Coming Soon ...