Page Not Found
Page not found. Your pixels are in another canvas.
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Page not found. Your pixels are in another canvas.
About me
This is a page not in th emain menu
Published:
Taj Mahal is a mausoleum located in Agra, India, built by Mughal emperor Shah Jahan in memory of his favorite wife, Mumtaz Mahal.Its believed that nearly it took 22 years to build one of the Wonder’s of the World. Construction began around 1632 A.D. and was completed around 1653 A.D., and employed thousands of artisans and craftsmen.
Published:
Michel de Nostredame was a French apothecary and reputed seer who published collections of prophecies that have since become famous worldwide. He is best known for his book Les Propheties (“The Prophecies”), the first edition of which appeared in 1555.
Published:
Well known as Da Vinci. Real name: Leonardo di ser Piero da Vinci, which means Leonardo, (son) of (Mes)ser Piero from Vinci.
Published:
Teaching is an art,which everyone must have experienced in their school( lucky ones ). Teachers spend more time with students than their parents. Radhakrishnan, Former President of India,was a teacher. In kind remeberance of him, we celebrate Teacher’s Day.
Published:
“Indian is the Country where Gandhi, Buddha, Nehru and many noble people lived. This Sentence seems to be very old. But do we get the real meaning of what it is?”
Published:
Event Link: RACAMBT-2023
Published:
Event Link: CAM
Published:
Project for: “NamChain Open Initiative Research Lab”
Published:
Project for: “Kuppai Innovative Lab and NamChain Open Initiative Research Lab”
Published:
Project for: “NamChain Open Initiative Research Lab”
Published:
Project for: “Independent”
Published in , 2019
The environment is the most sought-after topic for discussion in global forums because of the alarming threat it faces. Waste Management is one of the major challenges after global warming that affects the environment and harmony of nature. Government and non-governmental organisations are working towards solutions for better waste management. Though in present-day technology is part of waste management, it is not an integral part of waste management in many countries. Current technology only helps in reducing manual intervention by automating waste collection and transportation. It also helps in the disposal of non-useful waste and recycles/reuse useful waste by converting them into raw materials. People are the major part of the waste management cycle, so without their involvement, it is extremely difficult to make any technology-based system successful. People’s involvement in waste management would increase if they are incentivized for proper segregation of wastes, reusing, recycling, disposal and even for spreading awareness. The supportive technology should automatically monitor waste management cycle, record important actions and react accordingly.
Recommended citation: Gopalakrishnan, Preethi, and R. Ramaguru. "Blockchain based waste management." International Journal of Engineering and Advanced Technology 8.5 (2019): 2632-2635. https://www.ijeat.org/wp-content/uploads/papers/v8i5/E7828068519.pdf
Published in , 2019
Recent advancements in the Internet of Things and mobile internet helped the development of traditional Vehicular Adhoc-NETwork (VANET) based systems into the Internet of Vehicles (IoV). Vehicles in IoV make decisions based on the information from other vehicles and roadside infrastructure. This information helps them make critical decisions and alert the user about unpredictable situations. Security and privacy concerns in vehicles are increasing, hence it is important to address these issues, thus preventing malicious nodes transmitting falsified information or tampering critical communication data.
Recommended citation: Ramaguru R., Sindhu M., Sethumadhavan M. (2019) Blockchain for the Internet of Vehicles. In: Singh M., Gupta P., Tyagi V., Flusser J., Ören T., Kashyap R. (eds) Advances in Computing and Data Sciences. ICACDS 2019. Communications in Computer and Information Science, vol 1045. Springer, Singapore. https://link.springer.com/chapter/10.1007/978-981-13-9939-8_37
Published in , 2020
Huge adoption of the Internet into our daily lives generates at least few MBs of data. Social media in modern age enabled every single user with a smartphone and Internet to be a marketer, journalist, publisher and content creator. Ensuring protection and copyright of social media data like images, videos and audios are extremely demanding. Copyright infringement happens easily, and protecting the content for its originality and authenticity should be simplified.
Recommended citation: Kripa M., Nidhin Mahesh A., Ramaguru R., Amritha P.P. (2021) Blockchain Framework for Social Media DRM Based on Secret Sharing. In: Senjyu T., Mahalle P.N., Perumal T., Joshi A. (eds) Information and Communication Technology for Intelligent Systems. ICTIS 2020. Smart Innovation, Systems and Technologies, vol 195. Springer, Singapore. https://link.springer.com/chapter/10.1007%2F978-981-15-7078-0_43
Published in , 2021
In the last decade, blockchain technology has seen adoption to infinite domains, health care sector is one of the major domains where there are a greater opportunity and advantage to leverage the benefits of distributed ledgers in storing and securing patient medical records. The Government of India (GoI) is also very keen on digitization in addition to their wider adoption of blockchain technology to serve the citizens by ensuring their privacy and security of personally sensitive.
Recommended citation: Anjum S., Ramaguru R., Sethumadhavan M. (2021) Medical Records Management Using Distributed Ledger and Storage. In: Singh M., Tyagi V., Gupta P.K., Flusser J., Ören T., Sonawane V.R. (eds) Advances in Computing and Data Sciences. ICACDS 2021. Communications in Computer and Information Science, vol 1441. Springer, Cham. https://link.springer.com/chapter/10.1007/978-3-030-88244-0_6
Published in , 2022
Identity management is an inevitable part of the proper delivery of schemes and services to individuals by the government and private organizations. Identity management encompasses the creation and maintenance of identity. It ensures that the right entity gains access to the right resources at the right time for verification. It also involves providing high security, privacy, productivity, and enhanced user experience.
Recommended citation: Thomas A.M., Ramaguru R., Sethumadhavan M. (2022) Distributed Identity and Verifiable Claims Using Ethereum Standards. In: Ranganathan G., Fernando X., Shi F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311. Springer, Singapore. https://link.springer.com/chapter/10.1007%2F978-981-16-5529-6_48
Published in , 2022
In 2008, an unnamed person or group with the pseudonym ‘Satoshi Nakamoto’ introduced Bitcoin through a Whitepaper “A Peer-to-Peer Electronic Cash System”. Since then, both the number of users and the value of Bitcoin have grown. Bitcoin also introduced the concept of Blockchain Technology, which has now broadened to cover industries such as supply chain management, crowdfunding, open governance, education credentialing, health care, digital rights management, and Automotive
Recommended citation: Anuhya G, Ramaguru R (2022). "Open-Source Cryptocurrency Forensic Framework." Digital 4N6. vol 4 issue 1. pp 20-26. Digital 4N6. https://doi.org/10.46293/4n6/2022.02.01.03
Published in , 2022
The necessity for safeguarding wireless networks has increased due to an increase in the number of associated cyber-attacks on unsecured and weak wireless networks. It is critical for individuals, homeowners, and businesses to protect their wireless networks from external hackers. Wardriving is the act of an attacker foraging for wireless networks while driving a vehicle or while using a laptop or a smartphone. It is an efficient method for gathering information about nearby Wireless Access Points (WAPs), which aids in the analysis of a particular WAPs weakness.
Recommended citation: A. M. Thomas, G. A. Kumaran, R. Ramaguru, R. Harish and K. Praveen, "Evaluation of Wireless Access Point Security and Best Practices for Mitigation," 2021 5th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT), 2021, pp. 422-427. https://doi.org/10.1109/ICEECCOT52851.2021.9707914
Published in , 2022
The true power and the state of any technology are best known during difficult times. The yet-to-over COVID-19 lockdown has unleashed the power of online and remote modes of learning, evaluation, and working. The universities and educational institutions worldwide faced their big-time challenge in delivering, managing, evaluating their student’s learning progress. The need for an online-virtual-remote learning platform has become inevitable, which comes with a multitude of challenges, including usability, security, privacy, and real-time adoption.
Recommended citation: Sivadanam Y.L., Ramaguru R., Sethumadhavan M. (2022) Distributed Ledger Framework for an Adaptive University Management System. In: Chaki N., Devarakonda N., Cortesi A., Seetha H. (eds) Proceedings of International Conference on Computational Intelligence and Data Engineering. Lecture Notes on Data Engineering and Communications Technologies, vol 99. pp. 295-306. Springer, Singapore. https://doi.org/10.1007/978-981-16-7182-1_24
Published in , 2023
Decentralized identity solutions, built on the concept of Self-Sovereign Identity (SSI), have gained a competitive edge over existing identity management (IM) systems. This paper discusses the significance of decentralized identifier (DID) and verifiable credential (VC) in a peer-to-peer application for selling and managing pre-owned vehicles. The application uses Ethereum’s ERC-1056 lightweight DID standard.
Recommended citation: Thomas, A.M., Lakshmy, K.V., Ramaguru, R., Amritha, P.P. (2023). A Novel Approach to Build Privacy and Trust in Vehicle Sales Using DID. In: Ranganathan, G., Papakostas, G.A., Rocha, Á. (eds) Inventive Communication and Computational Technologies. ICICCT 2023. Lecture Notes in Networks and Systems, vol 757. Springer, Singapore. https://doi.org/10.1007/978-981-99-5166-6_9
Published in , 2023
OAuth2.0 is a Single Sign-On approach that helps to authorize users to log into multiple applications without re-entering the credentials. Here, the OAuth service provider controls the central repository where data is stored, which may lead to third-party fraud and identity theft. To circumvent this problem, we need a distributed framework to authenticate and authorize the user without third-party involvement.
Recommended citation: Krishna, D.P., Ramaguru, R., Praveen, K. et al. SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier. Sci Rep 13, 18335 (2023). https://doi.org/10.1038/s41598-023-44586-6 https://doi.org/10.1038/s41598-023-44586-6
Published:
Published:
Organised by: மண்வாசம் (Manvasam) - Ecoclub, Coimbatore
Represented: Kanavu Public Charitable Trust
Published:
Published:
Published:
Organised by: Department of Posts, Mettupalayam
Represented : Gandhimani Numismatics and Philately Club (GNPC)
Published:
Organised by: Department of Post, Tiruppur
Represented: Gandhimani Numismatics and Philately Club (GNPC)
Published:
Published:
Published:
Published:
Organised by: Dept. of Civil Engineering, M. Kumarasamy College of Engineering, Karur
Represented: Kuppai and Kanavu Public Charitable Trust
Published:
Organised by: Dept. of Information Technology, Eswari College of Engineering, Chennai
Represented: Amrita Vishwa Vidyapeetham, Coimbatore
Published:
Organised by: Directorate Of Admissions and Academic Outreach, Amrita Vishwa Vidyapeetham, Coimbatore
Link: YouTube
Published:
Campaign by: Amrita Vishwa Vidyapeetham & NDTV
Represented: Amrita Vishwa Vidyapeetham
Published:
Organised by: Dept. of Information Technology, Sri Krishna College of Engineering and Technology, Coimbatore
Published:
Organised by: EduDevs, Haryana and Amrita Vishwa Vidyapeetham, Coimbatore
Published:
Organised by: Department of Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore
Published:
Organised by: Center for Cyber Intelligence, Avinashilingam Institute of Home Science and Higher Education for Women, Coimbatore
Represented: Amrita Vishwa Vidyapeetham, Coimbatore
Published:
Organised by: The Department of B.Sc, PSGR Krishnammal College for Women, Coimbatore
Represented: Amrita Vishwa Vidyapeetham, Coimbatore
Published:
Organised by: ARRS Academy, CBSE School, Salem
Represented: Amrita Vishwa Vidyapeetham, Coimbatore
Published:
Organised by: Directorate of Agri Business Development, Tamil Nadu Agricultural University, Coimbatore
Represented: Amrita Vishwa Vidyapeetham, Coimbatore
Published:
Organised by: Dept. of Computer Science and Engineering, St. Joseph’s College of Engineering and Technology, Palai, Kerala
Represented: Amrita Vishwa Vidyapeetham, Coimbatore
Published:
Sponsored by: Tamil Nadu Government.
Organised by: Dept. of Information Technology, Government College of Engineering, Erode.
Represented: Amrita Vishwa Vidyapeetham, Coimbatore
Published:
Sponsored by: AICTE-ATAL
Organised by: TIFAC-CORE in Cyber Security
Published:
Organised by: Dept. of Digital and Cyber Forensic Science and Cyreack Association
Represented: Amrita Vishwa Vidyapeetham, Coimbatore