Dr. Subramanian  Karthikeyan

Dr. Subramanian Karthikeyan

Head of Department
College of Applied Sciences, Oman


Highest Degree
Ph.D. in Computer Science and Engineering from Alagappa University, India

Share this Profile

Biography

Dr. Subramanian Karthikeyan is currently working as Assistant Professor in IT at College of Applied Sciences, Affiliated with Otago University, Newzealand, Run by Ministry of Higher Education, Sohar, Sultanate of Oman. He has completed his Ph.D. in Computer Science and Engineering from Alagappa University, India. Previously he was appointed as Senior Lecturer at Caledonian College of Engineering, Sultanate of Oman, (Affiliated to Glasgow Caledonian University, Scotland, UK, Assistant Professor, Associate Professor, Professor & Director at Karpagam University. He is editor in chief for International Journal of Mobile Communications, ACEEE Publications, India, International Journal of Computer Science and System Analysis, guest editor for Journal of Advances in Information Technology, and associate editor for International Journal of Computers and Applications, The International Journal of Technology, Knowledge and Society, International Journal of Network Security, and Control and Intelligence Systems and member of editor board/technical editor for number of journals. He is also serving as reviewer for number of journals. He is member of International Association of Computer Science and Information Technology (IACSIT), Singapore, Association of Computer, Electronics and Electrical Engineers (ACEEE), India, Computer Science Teachers Association (CSTA), New York, USA, and International Association of Engineers Computer Science/ Wireless Networks, Canada/ Spain. He also guided 15 M.Phil, and 13 PhD students. His main area of research interest focuses on Cryptography and Network Security, Security Protocols, Key Management and Encryption Techniques, Sensor Network Security. He has published 1 book chapter, 118 research articles in international journals and conferences.

Area of Interest:

Computer Sciences
100%
IT Security
62%
Sensor Network Security
90%
Cryptography
75%
Steganography
55%

Selected Publications

  1. Karthikeyan, S. and S. Sundararajan, 2018. A review on energy aware resource management through decentralized and balanced workload in cloud computing. World J. Eng. Res. Technol., 4: 368-375.
  2. Karthikeyan, S., V.V. Gomathi and M. Hemalatha, 2016. An efficient hybrid filtering method for noise and artifacts removal in effective medical image segmentation. Asian J. Comput. Inform. Syst., 4: 18-25.
  3. Gomathi, V.V. and S. Karthikeyan, 2015. Multiple organ identification system using signature quadratic form distance for effective radiotherapy. Curr. Med. Imaging Rev., 11: 247-253.
    Direct Link  |  
  4. Gomathi, V.V. and S. Karthikeyan, 2015. Medical image mining and processing-What, why and how? Int. J. Data Min. Emerg. Technol., 5 45.
    CrossRef  |  ASCI  |  
  5. Gomathi, V.V. and S. Karthikeyan, 2015. A novel ECFT algorithm to improve the excellence of computer tomography images for effective segmentation. Int. J. Tomography Simul., 28: 45-62.
    Direct Link  |  
  6. Gomathi, V.V. and S. Karthikeyan, 2015. A new CUT method for spliced organ segmentation in computer tomography images to provide effective radiotherapy. Int. J. Tomography Simulation, 28: 13-22.
  7. Sundararajan, S. and S. Karthikeyan, 2014. An efficient hybrid approach for data clustering using dynamic K-means algorithm and firefly algorithm. ARPN J. Eng. Applied Sci., 9: 1-6.
  8. Sundararajan, S. and S. Karthikeyan, 2014. An efficient data ranking technique based on bicluster score. Int. J. Emerg. Trends Eng. Dev., 4: 377-386.
    Direct Link  |  
  9. Sakthivel, C.R. and S. Karthikeyan, 2014. Reliable multi-hop MISO based cooperative communications for energy-constrained wireless sensor networks. Int. J. Emerg. Trends Eng. Dev., 4: 180-189.
    Direct Link  |  
  10. Sakthivel, C. and D. Karthikeyan, 2014. Multi-hop unified routing algorithm for energy-constrained networks. J. Theor. Applied Inform. Technol., 69: 25-31.
    Direct Link  |  
  11. Gomathi, V.V. and S. Karthikeyan, 2014. Performance evaluation of HMSK and SQFD algorithms for computer tomography (CT) image segmentation of effective radiotherapy. J. Theor. Applied Inform. Technol., 66: 409-415.
    Direct Link  |  
  12. Gomathi, V.V. and S. Karthikeyan, 2014. Performance analysis of wavelet and curvelet filtering techniques for reduction of streak artifacts in computer tomography images. Int. J. Control Theory Applic., 7: 53-62.
  13. Gomathi, V.V. and S. Karthikeyan, 2014. Performance analysis of distance measures for computer tomography image segmentation. Int. J. Comput. Technol. Applic., 5: 400-405.
  14. Chandramohan, V.V.G. and D.S. Karthikeyan, 2014. An efficient clustering based segmentation algorithm for computer tomography image segmentation. J. Biomed. Eng. Med. Imag., 1: 1-11.
    Direct Link  |  
  15. Chandramohan, G. and S.K. Subramanian, 2014. An efficient hybrid segmentation algorithm for computer tomography image segmentation. Int. Rev. Comput. Software, 9: 1576-1582.
    Direct Link  |  
  16. Sakthivel, C.R. and S. Karthikeyan, 2013. A survey on wireless routing schemes in single and multi-hop energy constrained networks. CiiT Int. J. Networking Commun. Eng., 5: 461-465.
    Direct Link  |  
  17. Kavitha, N. and S. Karthikeyan, 2013. Customer buying behavior analysis: A clustered closed frequent itemsets for transactional databases. Int. J. Comput. Sci. Issues, 10: 113-117.
  18. Gunasundari, R. and S. Karthikeyan, 2013. An effective design for extracting web content from webpages. Eur. J. Scient. Res., 99: 473-484.
  19. Gomathi, V.V. and S. Karthikeyan, 2013. A Proposed Hybrid Medoid Shift with K-Means (HMSK) Segmentation Algorithm to Detect Tumor and Organs for Effective Radiotherapy. In: Mining Intelligence and Knowledge Exploration, Prasath, R. and T. Kathirvalavakumar (Eds.). Springer International Publishing, Switzerland, ISBN: 978-3-319-03843- pp: 139-147.
  20. Appathurai, K. and S. Karthikeyan, 2013. Moving object indexing using crossbreed update. Int. J. Comput. Applic., 69: 25-30.
    Direct Link  |  
  21. Thilagam, K. and S. Karthikeyan, 2012. Optimized image resizing using piecewise seam carving. Int. J. Comput. Applic., 42: 24-30.
    CrossRef  |  Direct Link  |  
  22. Thilagam, K. and S. Karthikeyan, 2012. Content aware retargeting of stego images. Int. J. Comput. Applic., 52: 4-8.
    Direct Link  |  
  23. Sundararajan, S. and S. Karthikeyan, 2012. A study on spatial data clustering algorithms in data mining. Int. J. Eng. Comput. Sci., 1: 37-41.
    Direct Link  |  
  24. Priya, S.M. and S. Karthikeyan, 2012. CMR-FD: Clustered multipath routing with false destination to increase the lifetime of sensor network. Int. J. Comput. Applic., 48: 11-16.
    Direct Link  |  
  25. Priya, S.M. and S. Karthikeyan, 2012. An efficient clustered multipath routing to improve lifespan in WSN. Int. J. Comput. Sci. Issues, 9: 182-187.
    Direct Link  |  
  26. Kavitha, N. and S. Karthikeyan, 2012. An efficient mining algorithm for closed frequent itemsets and its associated data. Int. J. Comput. Applic., 49: 22-25.
    Direct Link  |  
  27. Gunasundari, R. and S. Karthikeyan, 2012. A study of content extraction from web pages based on links. Int. J. Data Min. Knowl. Manage. Process, 2: 23-30.
  28. Gunasundari, R. and S. Karthikeyan, 2012. A new approach for web information extraction. Int. J. Comput. Technol. Applic., 3: 211-215.
  29. Appathurai, K. and S. Karthikeyan, 2012. Comparative analysis of proposed POBBx-index structure. Int. J. Comput. Technol. Applic., 3: 1349-1356.
  30. Appathurai, K. and S. Karthikeyan, 2012. A novel indexing method for BBx-index structure. Int. J. Comput. Technol. Applic., 3: 779-784.
  31. Appathurai, K. and S. Karthikeyan, 2012. A new proposed algorithm for OBBx-index structure. Int. J. Comput. Applic., 50: 32-36.
    Direct Link  |  
  32. Appathurai, K. and S. Karthikeyan, 2012. A new proposed algorithm for BBx-index structure. Int. J. Comput. Sci. Issues, 9: 287-293.
  33. Anand Kumar, M. and S. Karthikeyan, 2012. Investigating the efficiency of Blowfish and Rejindael (AES) algorithms. Int. J. Comput. Network Inform. Security, 4: 22-28.
    CrossRef  |  Direct Link  |  
  34. Thilagam, K. and S. Karthikeyan, 2011. An efficient method for content aware image resizing using PSC. Int. J. Comput. Technol. Applic., 2: 807-812.
  35. Thilagam, K. and S. Karthikeyan, 2011. An analysis of hybrid techniques of seam carving. Int. J. Comput. Sci. Eng., 3: 1406-1412.
    Direct Link  |  
  36. Radha, N., T. Rubya and S. Karthikeyan, 2011. Securing retinal template using quasigroups. J. Adv. Inform. Technol., 2: 80-86.
    CrossRef  |  Direct Link  |  
  37. Radha, N. and S. Karthikeyan, 2011. An evaluation of fingerprint security using noninvertible biohash. Int. J. Network Security Applic., 3: 118-128.
    CrossRef  |  Direct Link  |  
  38. Priyaa, D.S., T. Nachimuthu and S. Karthikeyan, 2011. An evolving approach on video frame retrieval based on color, shape and region. Int. J. Comput. Sci. Eng. Technol., 2: 84-89.
    Direct Link  |  
  39. Priya, S.M. and S. Karthikeyan, 2011. Increasing lifetime of sensor networks by using dynamic clustering. Int. J. Wireless Commun. Network., 3: 1-5.
  40. Narayanan, R. and K. Subramanian, 2011. An efficient secure biometric system with non-invertible gabor transform. Int. J. Comput. Sci. Issues, 8: 170-175.
    Direct Link  |  
  41. Mahalingam, P., N. Jeyaprakash and S. Karthikeyan, 2011. Components based key management algorithm for storage area networks. J. Adv. Inform. Technol., 2: 72-79.
    CrossRef  |  Direct Link  |  
  42. Kumar, M.A., S. Karthikeyan, K. Appathurai and P. Nagarajan, 2011. A novel security protocol based on hybrid cryptography. Int. J. Comput. Sci. Syst. Eng. Inform. Technol., 4: 35-39.
  43. Kavitha, N. and S. Karthikeyan, 2011. An efficient algorithm for mining frequent K-item sets for association rule mining in large databases. Data Min. Knowl. Eng., 3: 555-558.
    Direct Link  |  
  44. Kavitha, B., S. Karthikeyan and P.S. Maybell, 2011. Emerging intuitionistic fuzzy classifiers for intrusion detection system. J. Adv. Inform. Technol., 2: 99-108.
    CrossRef  |  Direct Link  |  
  45. Appathurai, K. and S. Karthikeyan, 2011. Survey on spatio-temporal access methods. Int. J. Comput. Applic., 18: 40-44.
  46. Anand Kumar, M. and S. Karthikeyan, 2011. Security model for TCP/IP protocol suite. J. Adv. Inform. Technol., 2: 87-91.
    CrossRef  |  Direct Link  |  
  47. Radha, N., S. Karthikeyan and P. Anupriya, 2010. Securing retina fuzzy vault system using soft biometrics. Global J. Comput. Sci. Technol., 10: 13-18.
    Direct Link  |  
  48. Radha, N. and S. Karthikeyan, 2010. A study on biometric template security. ICTACT J. Soft Comput., 1: 37-41.
  49. Kumar, M.A., K. Appathurai, P. Nagarajan and M. Hemalatha, 2010. Comparative analysis of IPv4 and IPv6 to evaluate performance. Int. J. Comput. Network Security, 2: 67-71.
  50. Kumar, M.A. and S. Karthikeyan, 2010. A new security architecture for TCP/IP protocol suite. Int. J. Adv. Res. Comput. Sci., 1: 177-181.
    Direct Link  |  
  51. Gunasundari, R. and S. Karthikeyan, 2010. A new approach to improve the performance of page content ranking in web content mining. Data Min. Knowl. Eng., 2: 63-65.
    Direct Link  |  
  52. Nagarajan, M. and S. Karthikeyan, 2009. Health condition observation in high level efficiency using an advanced sensor network. CIIT Int. J. Wireless Commun., 1: 183-189.
    Direct Link  |  
  53. Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2009. A design of security protocol using hybrid encryption technique (AES-rijndael and RSA). Int. J. Comput. Internet Manage., 17: 78-86.
    Direct Link  |  
  54. Karthikeyan, S., M. Hemalatha and V.V. Gomathi, 2008. Data mining-knowledge discovery database. Tamil Comput. Magazine, 12: 4-8.
  55. Karthikeyan, S., 2008. An extended MD5 (ExMD5) algorithm for better data integrity. J. Comput. Sci., 2: 584-592.
  56. Karthikeyan, S., E. Ramaraj and N. Lalitha, 2007. An analysis and improvement of security in wired equivalent privacy (WEP) algorithm using hybrid encryption technique. Int. J. Comput. Sci. Syst. Anal., 1: 75-81.
  57. Brindha, N., S. Karthikeyan and N. Lalitha, 2007. A comparative study between Business Process Outsourcing (BPO) and Knowledge Process Outsourcing (KPO). J. Manage., 2: 584-592.
  58. Shanmugavel, D.P., 2006. Trends in Bioinformatics. In: Microarray in Bioinformatics , Hemalatha, M. and S. Karthikeyan (Eds.). Pointer publishers, Jaipur, India, pp: 212-250.
  59. Ramaraj, A., N. Laitha and S. Karthikeyan, 2006. An analysis of key management in cryptographic algorithms. Asia J. Inform. Technol., 5: 963-967.
    Direct Link  |  
  60. Karthikeyan, S., E. Ramaraj and N. Lalitha, 2006. The new approach of secure protocol in smart card using hybrid encryption technique. ICFAI J. Syst. Manage., 2: 71-75.
  61. Karthikeyan, S., E. Ramaraj and N. Lalitha, 2006. An analysis of key management in transport layer security standard. PCTE J. Comput. Sci., 2: 78-84.
  62. Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. An improvement of Eun-jun-kyung-kee`s remote user authentication scheme in smart card using hybrid encryption. J. Comput. Sci., 1: 293-300.
  63. Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. A new approach of hybrid encryption technique in database security. Int. J. Technol. Knowledge Soc., 2: 55-60.
  64. Karthikeyan, S. and E. Ramaraj, 2006. A new type of network security protocol using hybrid encryption in virtual private networking. J. Comput. Sci., 2: 672-675.
    CrossRef  |  Direct Link  |  
  65. Karthikeyan, S. and E. Ramaraj, 2006. A design of enhanced security protocol for wireless communication using hybrid encryption technique (AES-rijndael and RSA). Indian J. Comput. Technol., 1: 22-29.
  66. Hemalatha, M., V.V. Gomathi and S. Karthikeyan, 2006. An efficient algorithm for predicting survival of medical data. Int. J. Technol. Knowledge Soc., 2: 37-48.
    Direct Link  |  
  67. Karthikeyan, S., M. Hemalatha and V.V. Gomathi, 2005. A data-mining tool to increase human life days from affecting cardiac arrest. Bioinformatics India J., 3: 96-111.
  68. Karthikeyan, S., M. Hemalatha and E. Ramaraj, 2005. Database search and retrieval system for bacteria. Bioinformatics India J., 3: 37-42.
  69. Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2005. An improvement of security of 802.22 using hybrid encryption (AES-rijndael and RSA). J. Inform. Sci. Technol., 1: 18-26.