JAYALAKSHMI MURUGAN

@kalasalingam.ac.in

Associate Professor
kalasalingam academy of research and education



              

https://researchid.co/jayalacsmi

EDUCATION

B.E M.E Ph.D

RESEARCH, TEACHING, or OTHER INTERESTS

Computer Science, Computer Science Applications, Computer Engineering, Computer Vision and Pattern Recognition

16

Scopus Publications

204

Scholar Citations

7

Scholar h-index

6

Scholar i10-index

Scopus Publications

  • Density Based Traffic Management System
    Amaranatha Sasthry S, Shyam Sundar R, Sri Ganesh M, Anand Kumar R, and Jayalakshmi M

    IEEE
    In the face of mounting challenges related to traffic congestion and road safety in modern urban areas, this paper introduces an innovative real-time traffic control system that leverages the capabilities of computer vision and embedded computing technologies. To achieve this, the system harnesses the power of OpenCV, a robust computer vision library, for the purpose of live vehicle detection using pre-trained cascade classifiers. By integrating cameras with Raspberry Pi devices, the system can capture real-time traffic footage, enabling the immediate analysis of traffic density and flow in multiple directions within the urban landscape. The core functionality of the system lies in its ability to process the captured video frames in real-time. By doing so, it can accurately detect vehicles, evaluate traffic flow conditions, and identify congested routes. This critical information is then employed to dynamically adjust traffic signals in response to the detected traffic conditions. These adjustments optimize traffic control measures, leading to the alleviation of congestion, and ultimately contributing to an enhancement in road safety. This paper provides a comprehensive exploration of the system architecture, the underlying algorithms, and integration details. Through this detailed discussion, the paper demonstrates the remarkable effectiveness of this approach in the realm of urban traffic management. By seamlessly combining computer vision and embedded computing technologies, this innovative traffic control system not only provides real-time insights into traffic conditions but also actively responds to these conditions to ensure a smoother and safer flow of vehicles through urban streets.

  • An Ensembled Grid based Machine Learning Approach For PD Classification From MRI Images
    Redhya M and M. Jayalakshmi

    IEEE
    Parkinson’s disease (PD) is a neuro-degenerative disease caused due to breakdown of brain cells in the central-part of the nervous system. As symptoms of PD appear only after 60% or more of these cells are destroyed, early detection is a tedious task. Several studies have proven that PD can be effectively diagnosed from MR-Images (MRI). This paper provides an ensembled machine learning model, Stacked-EG model, for MRI-image based PD classification. The dataset was obtained from PPMI (Parkinson’s Progression Markers Initiative) online repository which included 134 PD subjects (80 males and 54 females) and 126 healthy patients (60 males and 66 females) around 60 years old on average. Feature extraction is performed through the application of filters, including wavelet transformations and intensity-based enhancements. Feature selection is conducted using optimised XGBoost model’s feature significance scores. For classification, a Stacking Classifier which combines the strengths of XGBoost, SVM, and a Random Forest classifier was used. The model obtained an accuracy of 98.41% in classifying PD from healthy controls.

  • Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms
    Santosh Kumar Henge, Gnaniyan Uma Maheswari, Rajakumar Ramalingam, Sultan S. Alshamrani, Mamoon Rashid, and Jayalakshmi Murugan

    MDPI AG
    This article discusses the importance of cross-platform UX/UI designs and frameworks and their effectiveness in building web applications and websites. Third-party libraries (TPL) and plug-ins are also emphasized, as they can help developers quickly build and compose applications. However, using these libraries can also pose security risks, as a vulnerability in any library can compromise an entire server and customer data. The paper proposes using multi-authentication with specific parameters to analyze third-party applications and libraries used in cross-platform development. Based on multi-authentication, the proposed model will make setting up web desensitization methods and access control parameters easier. The study also uses various end-user and client-based decision-making indicators, supporting factors, and data metrics to help make accurate decisions about avoiding and blocking unwanted libraries and plug-ins. The research is based on experimentation with five web environments using specific parameters, affecting factors, and supporting data matrices.

  • Elliptic Seizure Detection on EEG Signals Using Bidirectional Long Short-Term Memory Model
    Shreya Patchala, Bura Vijay Kumar, Kotha Chandrakala, Abbas Hameed Abdul Hussein, and M. Jayalakshmi

    IEEE
    Many screening methods have been analyzed by employing the modalities of Magnetic Resonance Imaging (MRI) and Electroencephalography (EEG) to diagnose epileptic seizures. Deep Learning (DL) is a branch of artificial intelligence, which is a broad field. Conventional DL could only perform as well as people who made the features by hand. On the other hand, DL fully automates both feature extraction and categorization. EEG is an often employed and noteworthy method for assisting in the diagnosis of epilepsy and examining the movement of the human brain. Since EEG signals are non-stationary, a patient's seizure patterns will change during various recording sessions. This study uses a Bidirectional Long Short-Term Memory (Bi-LSTM) model to detect seizures and brain tumours. Preprocessing the EEG signal, extracting preictal features, hyper-optimization using Mayfly Optimization (MO). Long-term EEG recordings from the EEG and ABIDE fMRI datasets are used in the evaluation. Many returned features are used by the Bi-LSTM model, such as frequency domain and temporal information between extracted EEG channels prior to classification. The proposed Bi-LSTM accomplishes a 99.12% accuracy rate, 98.25% precision, 99.06% recall, and 98.53% f1-measure which is superior when related to existing models.

  • Cervical Cancer Screening Approach Using AI
    D. Santhi, M. Carmel Sobia, and M. Jayalakshmi

    CRC Press

  • Air quality prediction using remote sensing
    R. Raja Selvi, M. Shruthi, G. Nithya, S. Kalaiselvi, M. Jayalakshmi, and V. Gomathi

    AIP Publishing

  • Deep Learning for Phishing Website Detection
    Ksn Sushma, M. Jayalakshmi, and Tapas Guha

    IEEE
    Data security has become a major issue as digitalization across the world is rapidly increasing. Personal information of the user is extracted and exploited using one of the cyber-attack known as phishing. To detect phishing, and to avoid the user from visiting a non-legitimate website, a method is proposed in this paper. This method uses unique features of Uniform Resource Locator which can differentiate between legitimate and non-legitimate websites. To classify websites, Random forest and Support Vector Machines are two machine learning methods that are employed in this work. The internet offers a wealth of information that may be accessed. Because of the rapid development of technology, an unavoidable dependency on the Internet has emerged in all aspects of life. As the number of apps that run on the Internet continues to rise, there is also a rising worry of threats and a need to address problems that are connected to security. There are numerous web application threats in the Internet domain. These threats aim to either steal sensitive information from users, change the database of web servers, or undermine the credibility of a particular web application. There are many web application threats in the Internet domain. These threats include: One of the most significant dangers to information security is the character. Attacks that Deny Service to Others Session Hijacking attempts The CrossSite Scripting Language XSS Phishing and Buffer Overflow are Two Common Scams Phishing is one of these methods, and it involves tricking people into giving sensitive information such as usernames and passwords, credit card details, and sensitive bank information by way of email spoofing, instant messaging, or fake web sites whose look and feel give the appearance of a legitimate one. Examples of such information include usernames and passwords for online accounts, credit card details, and sensitive bank information. Important forms of phishing include deceptive phishing, malware-based phishing, host file poisoned content, and others. injection phishing through man-in-the-middle attacks, phishing via search engines, and phishing via social engineering Due to the fact that phishing may cause significant losses, it is necessary to implement new line processes in order to identify and stop phishing attacks. At this time, there are a number of techniques for detecting phishing. Some of these methods include blacklisting and whitelisting, visual resemblance, content-based approaches, and detecting phishing.

  • A genetic algorithm-based energy-aware multi-hop clustering scheme for heterogeneous wireless sensor networks
    R. Muthukkumar, Lalit Garg, K. Maharajan, M. Jayalakshmi, Nz Jhanjhi, S. Parthiban, and G. Saritha

    PeerJ
    Background The energy-constrained heterogeneous nodes are the most challenging wireless sensor networks (WSNs) for developing energy-aware clustering schemes. Although various clustering approaches are proven to minimise energy consumption and delay and extend the network lifetime by selecting optimum cluster heads (CHs), it is still a crucial challenge. Methods This article proposes a genetic algorithm-based energy-aware multi-hop clustering (GA-EMC) scheme for heterogeneous WSNs (HWSNs). In HWSNs, all the nodes have varying initial energy and typically have an energy consumption restriction. A genetic algorithm determines the optimal CHs and their positions in the network. The fitness of chromosomes is calculated in terms of distance, optimal CHs, and the node's residual energy. Multi-hop communication improves energy efficiency in HWSNs. The areas near the sink are deployed with more supernodes far away from the sink to solve the hot spot problem in WSNs near the sink node. Results Simulation results proclaim that the GA-EMC scheme achieves a more extended network lifetime network stability and minimises delay than existing approaches in heterogeneous nature.

  • Deep transfer learning for COVID-19 detection and infection localization with superpixel based segmentation
    N.B. Prakash, M. Murugappan, G.R. Hemalakshmi, M. Jayalakshmi, and Mufti Mahmud

    Elsevier BV

  • Novel Deep-Learning Approaches for Future Computing Applications and Services
    M. Jayalakshmi, K. Maharajan, K. Jayakumar, and G. Visalaxi

    Wiley

  • Fuzzy Logic-Based Health Monitoring System for COVID’19 Patients
    M. Jayalakshmi, Lalit Garg, K. Maharajan, K. Jayakumar, Kathiravan Srinivasan, Ali Kashif Bashir, and K. Ramesh

    Computers, Materials and Continua (Tech Science Press)

  • Sensor-Cloud based Precision Agriculture Approach for Intelligent Water Management
    M. Jayalakshmi and V. Gomathi

    Springer Science and Business Media LLC

  • Analysis of Precision Agriculture based on Random Forest Algorithm by using Sensor Networks
    K. Pavithra and M. Jayalakshmi

    IEEE
    India is the largest country where most of the human lives depends upon agriculture. Due to the shortage of water facilities, the yield of irrigation is affected. To reduce this shortage of water, different types of methods are invented to supply the correct level of water to the agricultural lands. Here precision irrigation system is used to maintain the perfect water supply from this method wastage of water can be reduced. By using this technique, we can achieve better harvesting results. The total amount of water for lands and plants can be calculated by using the PH value. To detect the PH level, a random forest algorithm is used. There is a direct relationship between the number of plants in the land and the results it can get. It improves the prediction accuracy.


  • Secure communication between wireless medical sensor networks and data servers using paillier and elgamal key cryptosystem
    A. Vasukidevi, M. Jayalakshmi, and V. Gomathi

    IEEE
    A wireless sensor network is used to sense the infected person's body condition and transmits the collected data to the database. The details including temperature, heartbeat, and blood pressure are sensed using appropriate sensors and stored in the servers. The details are encrypted using Paillier and ElGamal key cryptosystems for providing high security. The server is helpful in providing querying service to users. The encrypted data is fetched from the server and decrypted before authentication. To prevent the patient data from the attackers, new protocol is proposed, where the patient details are converted into numerical form. This numerical form is difficult to understand by the attackers. Then the numerical values are sent to servers through secure channels. The patient data are securely distributed by employing the Paillier and ElGamal cryptosystems. This project focuses on secure storage and communication. The secure data will be implemented based on cryptographic principle.

  • An enhanced underground pipeline water leakage monitoring and detection system using Wireless sensor network
    M. JayaLakshmi and V. Gomathi

    IEEE
    This paper describes about the design and implementation of a water leakage monitoring and detection system to monitor and detect leak with the help of wireless networked sensors. The objective of this enhanced system is to detect possible underground water leakage for residential water pipes that are monitored from a PC. Therefore, a robust and reliable Wireless sensor network which composes small Printed Circuit Boards (PCB), data from remote sensors of different types (acoustic, pressure, temperature, flow rate, etc.) are collected and monitored on a PC to detect the exact leakage position. Once a leak is detected, the water utility must take corrective action to minimize water losses in the water distribution system. Thus the proposed system will be used to save water and reduces the replacing cost.

RECENT SCHOLAR PUBLICATIONS

  • Revolutionizing Precision Agriculture Using Artificial Intelligence and Machine Learning
    J Murugan, M Kaliyanandi, M Carmel Sobia
    Data Science for Agricultural Innovation and Productivity, 110 2024

  • Optimizing multimodal feature selection using binary reinforced cuckoo search algorithm for improved classification performance
    K Thirugnanasambandam, J Murugan, R Ramalingam, M Rashid, ...
    PeerJ Computer Science 10, e1816 2024

  • Navigating College Campuses with Virtual Assistants
    J Murugan, KS Vamsi, KDD Reddy, KP Chand, KM Feroz
    2023 International Conference on the Confluence of Advancements in Robotics 2023

  • Cervical Cancer Screening Approach Using AI
    D Santhi, MC Sobia, M Jayalakshmi
    Applied Artificial Intelligence, 121-132 2023

  • Design and development of novel security approach designed for cloud computing with load balancing
    M Kaliyanandi, J Murugan, SK Subburaj, S Ganesan, ...
    AIP Conference Proceedings 2581 (1) 2023

  • Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms
    SK Henge, GU Maheswari, R Ramalingam, SS Alshamrani, M Rashid, ...
    Systems 11 (5), 262 2023

  • Deep learning for phishing website detection
    K Sushma, M Jayalakshmi, T Guha
    2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon), 1-6 2022

  • A genetic algorithm-based energy-aware multi-hop clustering scheme for heterogeneous wireless sensor networks
    R Muthukkumar, L Garg, K Maharajan, M Jayalakshmi, N Jhanjhi, ...
    PeerJ Computer Science 8, e1029 2022

  • Controlling The Brightness of Light by Using Touch Sensor
    M Jayalakshmi, M Bharathi, OM Mounika, NMTV Priyanka, T Madhuri
    2022

  • Air quality prediction using remote sensing
    RR Selvi, M Shruthi, G Nithya, S Kalaiselvi, M Jayalakshmi, V Gomathi
    AIP Conference Proceedings 2444 (1) 2022

  • Deep transfer learning for COVID-19 detection and infection localization with superpixel based segmentation
    NB Prakash, M Murugappan, GR Hemalakshmi, M Jayalakshmi, ...
    Sustainable cities and society 75, 103252 2021

  • Novel Deep‐Learning Approaches for Future Computing Applications and Services
    M Jayalakshmi, K Maharajan, K Jayakumar, G Visalaxi
    Simulation and Analysis of Mathematical Methods in Real‐Time Engineering 2021

  • Fuzzy logic-based health monitoring system for COVID’19 patients
    M Jayalakshmi, L Garg, K Maharajan, K Jayakumar, K Srinivasan, ...
    Computers, Materials and Continua 67 (2), 2431-2447 2021

  • Quantum Inspired Membrane Computing to Enhance Security in Cloud Network
    K Maharajan, S Thangam, G Visalaxi, A Shenbagarajan, M Jayalakshmi
    Solid State Technology 63 (6), 14735-14751 2020

  • Sensor-cloud based precision agriculture approach for intelligent water management
    M Jayalakshmi, V Gomathi
    International Journal of Plant Production 14 (2), 177-186 2020

  • Analysis of precision agriculture based on random forest algorithm by using sensor networks
    K Pavithra, M Jayalakshmi
    2020 International Conference on Inventive Computation Technologies (ICICT 2020

  • Pervasive health monitoring through video-based activity information integrated with sensor-cloud oriented context-aware decision support system
    M Jayalakshmi, V Gomathi
    Multimedia Tools and Applications 2018

  • Secure communication between wireless medical sensor networks and data servers using Paillier and ElGamal key cryptosystem
    A Vasukidevi, M Jayalakshmi, V Gomathi
    2016 International Conference on Computing Technologies and Intelligent Data 2016

  • An enhanced underground pipeline water leakage monitoring and detection system using Wireless sensor network
    M JayaLakshmi, V Gomathi
    2015 International Conference on Soft-Computing and Networks Security (ICSNS 2015

  • A study on water leakage detection in buried plastic pipes using wireless sensor networks
    AR Iyeswariya, RM Shamila, M JayaLakshm, K Maharajan, V Sivakumar
    Int. J. Sci. Eng. Res 3 (1) 2012

MOST CITED SCHOLAR PUBLICATIONS

  • Deep transfer learning for COVID-19 detection and infection localization with superpixel based segmentation
    NB Prakash, M Murugappan, GR Hemalakshmi, M Jayalakshmi, ...
    Sustainable cities and society 75, 103252 2021
    Citations: 44

  • An enhanced underground pipeline water leakage monitoring and detection system using Wireless sensor network
    M JayaLakshmi, V Gomathi
    2015 International Conference on Soft-Computing and Networks Security (ICSNS 2015
    Citations: 41

  • Fuzzy logic-based health monitoring system for COVID’19 patients
    M Jayalakshmi, L Garg, K Maharajan, K Jayakumar, K Srinivasan, ...
    Computers, Materials and Continua 67 (2), 2431-2447 2021
    Citations: 38

  • Sensor-cloud based precision agriculture approach for intelligent water management
    M Jayalakshmi, V Gomathi
    International Journal of Plant Production 14 (2), 177-186 2020
    Citations: 22

  • Pervasive health monitoring through video-based activity information integrated with sensor-cloud oriented context-aware decision support system
    M Jayalakshmi, V Gomathi
    Multimedia Tools and Applications 2018
    Citations: 18

  • A genetic algorithm-based energy-aware multi-hop clustering scheme for heterogeneous wireless sensor networks
    R Muthukkumar, L Garg, K Maharajan, M Jayalakshmi, N Jhanjhi, ...
    PeerJ Computer Science 8, e1029 2022
    Citations: 16

  • Analysis of precision agriculture based on random forest algorithm by using sensor networks
    K Pavithra, M Jayalakshmi
    2020 International Conference on Inventive Computation Technologies (ICICT 2020
    Citations: 8

  • A study on water leakage detection in buried plastic pipes using wireless sensor networks
    AR Iyeswariya, RM Shamila, M JayaLakshm, K Maharajan, V Sivakumar
    Int. J. Sci. Eng. Res 3 (1) 2012
    Citations: 5

  • Deep learning for phishing website detection
    K Sushma, M Jayalakshmi, T Guha
    2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon), 1-6 2022
    Citations: 4

  • Secure communication between wireless medical sensor networks and data servers using Paillier and ElGamal key cryptosystem
    A Vasukidevi, M Jayalakshmi, V Gomathi
    2016 International Conference on Computing Technologies and Intelligent Data 2016
    Citations: 4

  • Instantaneous emotion detection system using vocalizations
    M JayaLakshmi, K Maharajan, B Paramasivan
    IOSR Journal of Engineering (IOSRJEN), July 2012
    Citations: 2

  • Novel Deep‐Learning Approaches for Future Computing Applications and Services
    M Jayalakshmi, K Maharajan, K Jayakumar, G Visalaxi
    Simulation and Analysis of Mathematical Methods in Real‐Time Engineering 2021
    Citations: 1

  • Quantum Inspired Membrane Computing to Enhance Security in Cloud Network
    K Maharajan, S Thangam, G Visalaxi, A Shenbagarajan, M Jayalakshmi
    Solid State Technology 63 (6), 14735-14751 2020
    Citations: 1