Thangavel Murugan

Thangavel Murugan
  • B.E. (CSE), M.E.(CSE), Ph.D
  • Professor (Assistant) at United Arab Emirates University

About

88
Publications
6,707
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
530
Citations
Current institution
United Arab Emirates University
Current position
  • Professor (Assistant)
Additional affiliations
December 2020 - September 2021
Siksha O Anusandhan University
Position
  • Professor (Assistant)
July 2014 - December 2020
Thiagarajar College of Engineering
Position
  • Professor (Assistant)
July 2012 - July 2014
Anna University, Chennai
Position
  • Teaching Fellow
Education
July 2013 - April 2021
Madras Institute of Technology
Field of study
  • Computer Technology
September 2010 - July 2012
J.J.College of Engineering and Technology
Field of study
  • Computer Science and Engineering
August 2006 - May 2010
M.A.M College of Engineering
Field of study
  • Computer Science and Engineering

Publications

Publications (88)
Patent
The present invention generally relates to a virtual reality (VR) navigation system using artificial intelligence (AI), thus enabling providing of individualized and context-aware navigation experience in VR environments. It consists of an AI-inclusive central processing unit (CPU) that receives and processes real-time data from multiple hardware s...
Article
Full-text available
The evolution of blockchain technology presents transformative potential for event management, particularly in enhancing security, transparency, and efficiency across the industry. This paper introduces a blockchain-based event management system that leverages Sui blockchain technology to address critical challenges such as ticket fraud, data secur...
Preprint
Full-text available
The evolution of blockchain technology offers transformative ability for event control, specially in enhancing safety, transparency,and efficiency across the industry. This paper introduces a blockchain-based event management machine that leveragesSui blockchain era to cope with vital challenges together with ticket fraud, facts security, and exces...
Chapter
In the ever-evolving landscape of assistive technologies, the visually impaired community encounters unique challenges in pursuing heightened mobility and environmental awareness. The endeavor to navigate through perpetually shifting and often unpredictable surroundings necessitates innovative solutions that empower individuals with visual impairme...
Chapter
Natural catastrophes including hurricanes, floods, wildfires, and earthquakes can seriously harm people and property. Floods that destroy houses, businesses, government buildings, and other properties cause enormous economic losses in addition to human casualties. This loss cannot be recovered; however, flood damage can frequently be reduced by sup...
Chapter
Online proctoring tools and techniques have gained significant attention in recent years due to the increasing popularity of online learning platforms and online assessments. This chapter provides an in-depth analysis of different online proctoring techniques and tools that are commonly used to maintain the integrity of online exams. The chapter be...
Chapter
The increasing demand for online education has opened up new avenues for academic institutions and students alike. However, the issue of maintaining academic integrity during online exams has emerged as a significant challenge. To address this concern, artificial intelligence (AI) has been harnessed to create sophisticated online proctoring systems...
Chapter
Cloud robotics is currently regarded as one of the cutting-edge research areas within the mainstream automation and artificial intelligence fields. The new machine-to-cloud communication will increase the productivity and efficiency of industrial robots. For decades, automated devices have been developing and affecting practically every element of...
Article
Full-text available
With its exponential growth, the Internet of Things (IoT) has produced unprecedented levels of connectivity and data. Anomaly detection is a security feature that identifies instances in which system behavior deviates from the expected norm, facilitating the prompt identification and resolution of anomalies. When AI and the IoT are combined, anomal...
Chapter
Web authentication methods are subject to several attacks due to the rapid expansion of information technology. It is apparent that the evolution of authentication-bypassing strategies, from brute force to dictionary attacks, will advance. Simple word lists, for instance, are employed in traditional dictionary attacks to crack commonly used usernam...
Article
Full-text available
This state-of-the-art review comprehensively examines the landscape of Distributed Denial of Service (DDoS) anomaly detection in Software Defined Networks (SDNs) through the lens of advanced Machine Learning (ML) and Deep Learning (DL) techniques. The application domain of this work is focused on addressing the inherent security vulnerabilities of...
Article
Nowadays, Online Education has been an inevitable choice of practice in the teaching-learning process. Learner engagement is one of the ineluctable challenges faced by the course teachers. For sustaining the learner's engagement throughout the course, teachers have to plan teaching-learning activities such as learning environment, content delivery,...
Article
Full-text available
In the rapidly evolving landscape of computing and networking, the concepts of cloud networks have gained significant prominence. Although the cloud network offers on-demand access to shared resources, anomalies pose potential risks to the integrity and security of cloud networks. However, protecting the cloud network against anomalies remains a ch...
Article
Full-text available
In the above article [1] , reference 40 was retracted. As the work in this reference is no longer reliable, we are replacing it with [2] . As a result, the fourth paragraph of Section VI.A. DDoS ANOMALY BASED ON ML—EXISTING RESEARCH WORKS on page 56755 is changed to the following:
Article
Traditional testimony and electronic endorsements are extremely challenging to uphold and defend, and there is a problem with challenging authentication. The identity of the student is typically not recognized when it comes to requirements for access to a student’s academic credentials that are scattered over numerous sites. This is an issue with c...
Chapter
Cyber-physical systems (CPS) are the next generation of intelligent systems that combine the inherent and comprehensive embedding of communication and control technologies to integrate computational resources with hardware facilities. The CPS modules are more vulnerable to an attacker, raising the possibility of physical attacks that might compromi...
Chapter
The name Industry 4.0 describes a synthesis of modern manufacturing techniques that help producers to hit targets more quickly. The manufacturing sector's trend is changing significantly because of digitalization and technological improvements. Technology that aids in comprehensive integration, such as IoT, cybersecurity, blockchain, big data, etc....
Article
The competencies of engineering students are measured through personal, interpersonal and communication skills. This work aims to improve these skills of engineering students through a Design Thinking course. The course involves a series of individual and team activities in the process of conceptual design modeling or prototype development, which i...
Article
Present generation of students give less attention in class. This is a serious issue among college or university-level students. The faculty members have to use active learning strategies to have better student engagement in their classes. The faculty has to carefully design these pedagogical practices in such a way that more than one student gets...
Chapter
In the internet era, data is considered to be the primary asset, and the host or applications in a network are vulnerable to various attacks. Traditional network architectures have centralized authority to provide authentication, authorization, and access control services. In this case, there is a possibility of data mishandling activities from the...
Chapter
Full-text available
In today's world, everyone is generating a large amount of data on their own. With this amount of data generation, there is a change of security compromise of our data. This leads us to extend the security needs beyond the traditional approach which emerges the field of cyber security. Cyber security's core functionality is to protect all types of...
Chapter
In recent years, the rise in the demand for quality products and services along with systems that could integrate the control mechanisms with high computational capabilities led to the evolution of cyber-physical systems (CPS). Due to the ongoing COVID-19 pandemic, several industries have remained closed, causing several monetary losses. Automation...
Chapter
Cloud has become the primary means of mass data storage, with millions of users transacting data every second. Several companies and organizations have set up businesses to provide users around the world with efficient cloud storage systems. With the rise in demand for cloud storage, several Cloud Service Providers (CSPs) face an uphill task to mee...
Chapter
With the surge of breast cancer, researchers have proposed many predicting methods and techniques. Currently, mammograms and analyzing the biopsy images are the two traditional methods used to detect the breast cancer. In this paper, the objective is to create a model that can classify or predict whether breast cancer is benign or malignant. Typica...
Chapter
Electronic voting is essential in the digital world for voters, who will make their choice of vote through smartphones or computers. Ballot composition, ballot casting, ballot recording, and tabulation are the four steps in the election process. Electronic voting technology aims to speed up ballot counting, minimize the expense of hiring employees...
Article
Full-text available
In response to the coronavirus (COVID-19) pandemic, Government and public health authorities around the world are developing contact tracing apps as a way to trace and slow the unfold of the virus. There is major divergence among nations, however, between a “privacy-first” approach that protects citizens’ information at the price of very restricted...
Chapter
Cloud computing is the fastest growing technology in today's world. Cloud services provide pay as go models on capacity or usage. For providing better cloud services, capacity planning is very important. Proper capacity planning will maximize efficiency and on the other side proper control over the resources will help to overcome from attacks. As t...
Chapter
In recent years, computer worms are the remarkable difficulties found in the distributed computing. The location of worms turns out to be more unpredictable since they are changing quickly and much more refined. The difficulties in gathering worm's payload were recognized for identifying and gathering worm's payloads and the honey pot which is high...
Chapter
Smart devices like mobile phones, tablets, and laptops have become necessities in our lives due to the services they provide. However, in recent days, mobile applications have become a major threat for an attack. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. Howev...
Chapter
On facing this fast-moving world every bit of the world is leading by technology. Mobile phones are the major part of our day to day life. Mobile platforms are said to be the hardware and software environment for laptops, tablets, smartphones and also for other portable devices. Mobile operating systems and browsers lack secure application identity...
Chapter
In the internet era, data is considered to be the primary asset, and the host or applications in a network are vulnerable to various attacks. Traditional network architectures have centralized authority to provide authentication, authorization, and access control services. In this case, there is a possibility of data mishandling activities from the...
Chapter
Learners of countryside background, face different types of problems and challenges when they do their higher education in urban areas. Their culture, custom, and the way they had been taught in their schools are entirely different. These differences are the major concern for some students and they usually perform low in their higher education. It...
Chapter
In today's world, everyone is generating a large amount of data on their own. With this amount of data generation, there is a change of security compromise of our data. This leads us to extend the security needs beyond the traditional approach which emerges the field of cyber security. Cyber security's core functionality is to protect all types of...
Chapter
Full-text available
In the present scenario, the innovation in teaching is necessary to engage the students for the course of 36 to 40 hours. At the end of the course, the average student's strength will excel in performance and attains the course outcome with in-depth knowledge. To overcome the difficulties of slow and inactive learners for attaining the course outco...
Article
Cloud Computing enables the remote users to access data, services and applications in on-demand from the shared pool of configurable computing resources. On the other hand, it is not easy for the cloud users to identify whether Cloud Service Provider's (CSP) tag along with the data security legal expectations. So, cloud users could not rely on CSP'...
Chapter
Network scanning commonly implies the use of the computer network to collect information about the target systems. This type of scanning is performed by hackers for attacking the target and also by the system administrators for assessment of security and maintaining the system. Network scanning mainly analyzes the UDP and TCP network services that...
Chapter
Cloud computing has given a bloom to the technical world by providing various services. Data storage is the essential factor for the users who are having or working with lots and lots of data. Cloud data storage becomes the only way to store and maintain the large data, which can be accessed from anywhere and anytime. The open nature of cloud compu...
Chapter
Cloud computing is a technology that offers an enterprise model to provide resources made available to the client and network access to a shared pool of configurable computing resources and pay-for-peruse basis. Generally, a session is said to be the collective information of an ongoing transaction. This package is typically stored on the server as...
Article
Full-text available
Cloud computing enables the access of the resources such as network hardware’s, storage, applications and services that are configurable based on the demand in a network especially specific to the operations on the data. The need for data security in the cloud is progressively higher as the abundant sensitive data in the cloud are transferred among...
Chapter
Information security plays a vital role in almost every application that we handle in our day-to-day life since the communication needs to be protected in terms of the messages that we send and receive. Thus, cryptography the science of encoding the secret information provides security from being known by the unintended receivers. It ensured confid...
Chapter
Cryptography is an art of secret writing. To ensure data security in both data transfer and data storage cryptographic techniques are used for the data we handle in our day to day activities. The need for cryptographic techniques exists from the period of 150 B.C. till date. Though there are too many cryptographic algorithms, an algorithm with redu...
Chapter
Cloud computing is a highly scalable and cost-effective infrastructure for running HPC, enterprise and Web applications. However, the growing demand of Cloud infrastructure has drastically increased the energy consumption of data centers, which has become a critical issue. High energy consumption not only translates to high operational cost, which...
Chapter
Cloud computing is a technology for complex computing, it eliminates the need to have computing hardware, storage space and software. Multi tenancy is considered as important element in which same resources will be shared by multiple users. The users are named as tenants in the cloud environment. The tenants may run their applications in their own...
Chapter
In recent years, computer worms are the remarkable difficulties found in the distributed computing. The location of worms turns out to be more unpredictable since they are changing quickly and much more refined. The difficulties in gathering worm's payload were recognized for identifying and gathering worm's payloads and the honey pot which is high...
Chapter
Cloud computing is the fastest growing technology in today's world. Cloud services provide pay as go models on capacity or usage. For providing better cloud services, capacity planning is very important. Proper capacity planning will maximize efficiency and on the other side proper control over the resources will help to overcome from attacks. As t...
Chapter
Cloud computing has given a bloom to the technical world by providing various services. Data storage is the essential factor for the users who are having or working with lots and lots of data. Cloud data storage becomes the only way to store and maintain the large data, which can be accessed from anywhere and anytime. The open nature of cloud compu...
Chapter
Cloud computing is a technology that offers an enterprise model to provide resources made available to the client and network access to a shared pool of configurable computing resources and pay-for-peruse basis. Generally, a session is said to be the collective information of an ongoing transaction. This package is typically stored on the server as...
Chapter
Information security plays a vital role in almost every application that we handle in our day-to-day lifesince the communication needs to be protected in terms of the messages that we send and receive. Thus,cryptography the science of encoding the secret information provides security from being known by theunintended receivers. It ensured confident...
Article
Technologies like cloud computing provide a generous storage service to outsource the business and personal data. The major research challenge of data outsourcing is ensuring data confidentiality. Public key cryptography (PKC) is used in an open networking environment like the internet, for secure communication without depending on a secure channel...
Conference Paper
Nowadays, Cloud storage helps the users to remotely store and access the data. Any modification or corruption in data by unauthorized users will lead to insecure cloud framework. Protecting the users data from unauthorized access or malicious attacks in cloud is one of the major research direction to address the issues of data privacy and integrity...
Article
Cloud computing provides IT services like computation, storage, networking, and software to the users. Cloud storage services allows users to access the data anywhere and at anytime, under the supervision of cloud service provider (CSP). Protecting the data against data breaches in the cloud is still a challenging issue for CSP. Public key cryptogr...
Chapter
Digital Sphere is a global network which consists of all the resources that are required for the users, who connected with the digital network. It connects the entire world through the digital technologies. The digital network includes services, applications, and web page files. By connecting, to this network, people from one end in the world can a...
Article
Security in cloud storage is an important aspect of cloud computing. In this paper, a novel multi-level encryption scheme which ensures security in cloud is introduced. In this scheme, a modified RSA (MRSA) key generation algorithm is used to generate the phase keys. The file is first subjected to encryption using MRSA with phase public keys. For s...
Article
Public-key cryptography can be claimed as the greatest and an excellent revolution in the field of cryptography. A public-key cryptosystem is used for both confidentiality and authentication. One such public-key cryptosystem is the RSA cryptosystem. In this paper, a modified and an enhanced scheme based on RSA public-key cryptosystem is developed....
Article
In cloud computing, remote based massive and scalable data storage services are provided to the users. Data storage and retrieval services need to be modernized for secure communication in the cloud. So, in this paper, user centric personalization and prediction based searching techniques have been proposed to improve the data storage and retrieval...
Conference Paper
To improve the network security by a cryptographic primitive called proxy re-encryption in which a proxy can transform a ciphertext encrypted under one key without seeing the actual plaintext into an encryption of the same plaintext under another key. This cryptographic concept has recently drawn renewed interest. Some researchers also showed how t...

Network

Cited By