Dr. M.Chithik Raja

@sct.edu.om

Faculty , Information Technology
University of Technology and Applied Sciences Salalah



                       

https://researchid.co/chithik43

RESEARCH, TEACHING, or OTHER INTERESTS

Computer Engineering, Artificial Intelligence, Multidisciplinary, Renewable Energy, Sustainability and the Environment

5

Scopus Publications

191

Scholar Citations

8

Scholar h-index

7

Scholar i10-index

Scopus Publications

  • Secure and Scalable Healthcare Data Transmission in IoT Based on Optimized Routing Protocols for Mobile Computing Applications
    Eshrag Refaee, Shabana Parveen, Khan Mohamed Jarina Begum, Fatima Parveen, M. Chithik Raja, Shashi Kant Gupta, and Santhosh Krishnan

    Hindawi Limited
    The Internet of Things (IoT) has impacted various aspects of life, but its profound effects on the health sector are particularly striking because of its cutting-edge nature. Mobile computing characteristics enable IoT to play a more important role when used with mobile computing. A significant part of the benefits of IoT in healthcare can be attributed to mobile health, which is greatly enhanced by mobile computing. Wearables transmit large amounts of data to IoT devices through sensors, actuators, and transceivers. Threats, attacks, and vulnerabilities abound for data on the Internet of Things. Therefore, addressing IoT-related security, privacy, and vulnerability issues call for a robust security solution. This paper proposes a secure and scalable healthcare data transmission framework in IoT based on an optimized routing protocol. Initially, the health data is collected from various IoT devices like wearable devices and sensors. The raw data is preprocessed via data cleaning and data reduction techniques. K-nearest neighbor (KNN) imputation is performed and principal component analysis (PCA) is employed for dimension reduction of the data. Utilizing modified local binary patterns (MLBP), the features are extracted from the preprocessed data. By combining the fuzzy dynamic trust-based RPL algorithm with the butter ant optimization (BAO) algorithm for low-power and lossy networks, the proposed fuzzy dynamic trust-based RPL (FDT-RPL) protocol improves the overall security of data transmission. The algorithm has been implemented for a smart healthcare system, and the performance is analyzed by comparing it with traditional approaches. The proposed routing protocol provided a secure and scalable healthcare data transmission.


  • Analytical inspection of centrality measures in social networking


  • Combined analysis of support vector machine and principle component analysis for IDS
    M. Chithik Raja and M. Munir Ahmed Rabbani

    IEEE
    In the modern world we are using the smart devices for storing data, retrieving data and processing the data on the cloud which is energy users to manage a wide variety of subscribers, reading devices for measuring, billing, disconnection and connection of subscribers from the connection management is an important issue. The performance of these intelligent systems is based on information transfer in the context of storing Big data, so reported data from network should be managed to avoid the malicious activities that including the issues that could affect the quality of service the system. In this paper for control of the reported wireless data and to ensure the veracity of the obtained information, using intrusion detection system is proposed based on the support vector machine and principle component analysis (PCA) to recognize and identify the intrusions and attacks in the smart grid. Here, the operation of intrusion detection systems for different kernel of SVM when using support vector machine (SVM) and PCA simultaneously is studied. To evaluate the algorithm, based on data KDD99, numerical simulation is done on five different kernels for an intrusion detection system using support vector machine with PCA simultaneously. Also comparison analysis is investigated for presented intrusion detection algorithm in terms of time — response, rate of increase network efficiency and increase system error and differences in the use or lack of use PCA. The results indicate that correct detection rate and the rate of attack error detection have best value when PCA is used, and when the core of algorithm is radial type, in SVM algorithm reduces the time for data analysis and enhances performance of intrusion detection.

  • Big data storage system handling and analytic platform on technology


RECENT SCHOLAR PUBLICATIONS

  • Demand response analysis in microgrids with blockchain: A comprehensive cyber-physical approach
    M Raja, P Saranya, SK Jagannathan, G Bizel
    Next-Generation Cyber-Physical Microgrid Systems, 1-28 2024

  • Endometrial Cancer Detection Using Pipeline Biopsies Through Machine Learning Techniques
    V Varshini, M Raja, SK Jagannathan
    Bio-Inspired Optimization Techniques in Blockchain Systems, 130-149 2024

  • Utilizing YOLO 8x Models, Deep Learning-Based Head protector Detection for Construction Workers
    MC Raja
    2023

  • WIRELESS LAPTOP CHARGER CUM COOLING PAD
    MC Raja
    IN Patent 395484-001 2023

  • ELECTRONIC COMMERCE SUPPLY CHAIN MANAGEMENT SYSTEM FOR DECORATIVE MATERIALS USING MACHINE LEARNING
    MC Raja
    DE Patent 20 2022 106 961.1 2023

  • A METHOD FOR DETECTION OF BREAST CANCER BASED ON IOT AND MACHINE LEARNING ALGORITHMS
    MC Raja
    IN Patent 202,241,062,361 2022

  • Data analytics for socio-economic factors affecting crime rates
    M Raja, P Venkatasubbu, B Alhadidi
    Machine Learning, Blockchain Technologies and Big Data Analytics for IoTs 2022

  • Secure and Scalable Healthcare Data Transmission in IoT Based on Optimized Routing Protocols for Mobile Computing Applications
    SK Eshrag Refaee ,1 Shabana Parveen,2 Khan Mohamed Jarina Begum,1 Fatima ...
    Wireless Communication and Mobile Computing 2022 (Special Issue) 2022

  • Secure and Scalable Healthcare Data Transmission in IoT Based on Optimized Routing Protocols for Mobile Computing Applications
    SK Eshrag Refaee ,1 Shabana Parveen,2 Khan Mohamed Jarina Begum,1 Fatima ...
    Wireless Communication and Mobile Computing 2022 (Special Issues) 2022

  • Smart License Approval Using AIOT
    A Jagati, M Raja
    International Conference on Computer, Communication, and Signal Processing 2022

  • Research Article Secure and Scalable Healthcare Data Transmission in IoT Based on Optimized Routing Protocols for Mobile Computing Applications
    E Refaee, S Parveen, KMJ Begum, F Parveen, MC Raja, SK Gupta, ...
    2022

  • Smart city: An intelligent automated mode of transport using shortest time of travel using big data
    M Srivastava, S Saumya, M Raja, M Natarajan
    Frontiers of Data and Knowledge Management for Convergence of ICT 2022

  • LITHIUM-ION BATTERY RANGE AND SoC PREDICTION FOR ELECTRIC VEHICLE
    MC Raja
    IN Patent 202,141,020,402 2021

  • Second iiScience International Conference 2021: Recent Advances in Photonics and Physical Sciences
    M Raja, SA Haider, MI Asghar, F Jubeen, S Parveen
    Second iiScience International Conference 2021: Recent Advances in Photonics 2021

  • Quantization and training of Object detection using low bit width convolutional neural networks
    MC Raja
    IN Patent 202,141,029,270 2021

  • Enhanced framework for ensemble effort estimation by using recursive‐based classification
    A Hussain, M Raja, P Vellaisamy, S Krishnan, L Rajendran
    IET Software 15 (3), 230-238 2021

  • AN EMBEDDED DIGITAL WATERMARKING FRAMEWORK USING DEEP LEARNING NETWORK
    MC Raja
    IN Patent 202,141,015,740 2021

  • MATHEMATICAL APPLICATION TECHNOLOGY FOR IOT DATA ANALYSIS AND OPTIMIZATION
    MC Raja
    IN Patent 202,141,052,317 2021

  • Optimization of Beamforming in Subarray Antennas Using Firefly Algorithm
    C Raju, MR Raja, MMR Paul, ML Moses
    IOP Conference Series: Materials Science and Engineering 1084 (1), 012038 2021

  • Recommendation Model Based on Expiry Date of Product Using Big Data Analytics
    AK Singh, M Raja, A Hussain
    Big Data Analytics in Supply Chain Management, 65-77 2020

MOST CITED SCHOLAR PUBLICATIONS

  • Secure and Scalable Healthcare Data Transmission in IoT Based on Optimized Routing Protocols for Mobile Computing Applications
    SK Eshrag Refaee ,1 Shabana Parveen,2 Khan Mohamed Jarina Begum,1 Fatima ...
    Wireless Communication and Mobile Computing 2022 (Special Issues) 2022
    Citations: 49

  • Using a custom mega prosthesis to treat hydatidosis of bone: a report of 3 cases
    MV Natarajan, AK Kumar, A Sivaseelam, P Iyakutty, M Raja, ...
    Journal of Orthopaedic Surgery 10 (2), 203-205 2002
    Citations: 38

  • Combined analysis of support vector machine and principle component analysis for IDS
    MC Raja, MMA Rabbani
    2016 International Conference on Communication and Electronics Systems 2016
    Citations: 30

  • IPv6 tunneling over IPV4
    AS Narayanan, MSK Mohideen, MC Raja
    International Journal of Computer Science Issues (IJCSI) 9 (2), 599 2012
    Citations: 13

  • Enhanced framework for ensemble effort estimation by using recursive‐based classification
    A Hussain, M Raja, P Vellaisamy, S Krishnan, L Rajendran
    IET Software 15 (3), 230-238 2021
    Citations: 12

  • Big data analytics security issues in data driven information system
    MC Raja, MA Rabbani
    Int J Innov Res Comput Commun Eng 2 (10), 6132-5 2014
    Citations: 12

  • Sensor node deployment and coverage prediction for underwater sensor networks
    A Katti, DK Lobiyal
    2016 3rd international conference on computing for sustainable global 2016
    Citations: 10

  • Analysis and a report of wireless sensor networks and applications
    MC Raja, VS Balasubramanian
    International Journal of Computer Science Issues (IJCSI) 8 (4), 589 2011
    Citations: 8

  • The minimum cost forwarding using MAC protocol for wireless sensor networks
    MC Raja
    Int. J. Mod. Eng. Res 2 (4), 4122-4127 2012
    Citations: 4

  • Energy Conservation Techniques and Application for Wireless Sensor Networks
    C Raja, M Sinnaiya
    IJCSIT) International Journal of Computer Science and Information 2012
    Citations: 3

  • Performance Evaluation Of All Pair Shortest Path Parallel Algorithm Used In Big Data
    MC Raja, MMA Rabbani
    International Journal Of General Engineering And Technology (Ijget) 6, 55-62 2017
    Citations: 2

  • Evaluation of efficacy and safety of nimesulide with betacyclodextrin vs nimesulide tablets in osteoarthritis.
    M Raja, A Sivaseelam, R Subbiah, NR Yuvaraj, K Chandran, ...
    Journal of the Indian Medical Association 99 (8), 451-452 2001
    Citations: 2

  • M., & Chithik Raja, M.,(2015), Big data storage system handling and analytic platform on technology
    M Chithik Raja, MA Rabbani
    International Journal of Applied Engineering Research 10 (12), 30219-30232
    Citations: 2

  • Utilizing YOLO 8x Models, Deep Learning-Based Head protector Detection for Construction Workers
    MC Raja
    2023
    Citations: 1

  • Smart License Approval Using AIOT
    A Jagati, M Raja
    International Conference on Computer, Communication, and Signal Processing 2022
    Citations: 1

  • Smart city: An intelligent automated mode of transport using shortest time of travel using big data
    M Srivastava, S Saumya, M Raja, M Natarajan
    Frontiers of Data and Knowledge Management for Convergence of ICT 2022
    Citations: 1

  • Comprehensive and Coordinated Security of Knox gateway in Big Data
    MC Raja, MMA Rabbani
    Journal of Advance Research in Science and Engineering 4 (3), 61-69 2015
    Citations: 1

  • High Performance System in GPU and CUDA Media Processing System.
    MC Raja
    International Journal of Advanced Research in Computer Science 3 (3) 2012
    Citations: 1

  • Survey of Tolerant Network in Mobile Communication
    MC Raja, NM Yasin, MSD Rajan
    International Journal of Computer Science Issues (IJCSI) 9 (1), 299 2012
    Citations: 1