Search Results - "Kumar, K. Pradeep Mohan"
-
1
Implementation of Software Agents and Advanced AoA for Disease Data Analysis
Published in Journal of medical systems (01-08-2019)“…To eliminate the possibilities of getting various contradicting solutions to a single problem during diagnosis, a single regular Agent oriented Approach (AoA)…”
Get full text
Journal Article -
2
Brain Tumor Segmentation Using Convolutional Neural Networks in MRI Images
Published in Journal of medical systems (01-09-2019)“…In medical image processing, Brain tumor segmentation plays an important role. Early detection of these tumors is highly required to give Treatment of…”
Get full text
Journal Article -
3
An intelligent cognitive computing based intrusion detection for industrial cyber-physical systems
Published in Measurement : journal of the International Measurement Confederation (01-12-2021)“…•Design an intelligent BBFO-GRU model for Intrusion Detection in Industrial Cyber-Physical environment.•Propose a Gated Recurrent Unit (GRU) model is applied…”
Get full text
Journal Article -
4
FWICSS-Federated Watermarked Ideal Client Selection Strategy for Internet of Things (IoT) Intrusion Detection System
Published in Wireless personal communications (01-08-2024)“…The Internet of Things (IoT) is a rapidly growing technology that has been generating increasing amounts of traffic from multiple devices. However, this growth…”
Get full text
Journal Article -
5
Computational Analysis and Optimization of Spiral Plate Heat Exchanger
Published in Journal of applied fluid mechanics (01-10-2018)“…From the past few decade, many manufacturing industries are using heat exchangers for reducing the energy consumption and hence reducing the fuel costs. Most…”
Get full text
Journal Article -
6
Multilevel scheduling mechanism for a stochastic fog computing environment using the HIRO model and RNN
Published in Sustainable computing informatics and systems (01-09-2023)“…Recent years have shown us that even when we are not physically there, we may nevertheless connect to the entire world. The enormous growth in the number of…”
Get full text
Journal Article -
7
O‐SCDR: Optimal cluster with attention based shared‐account cross‐domain sequential recommendation using deep reinforcement learning technique
Published in Expert systems (01-08-2024)“…Sequential recommendation involves suggesting subsequent items in a series of user activities. When recommending relevant items to users within the same…”
Get full text
Journal Article -
8
Intrusion detection system based on GA‐fuzzy classifier for detecting malicious attacks
Published in Concurrency and computation (10-02-2021)“…Summary Usage of computer resources, being a very important part in day to day life, it is to be noticed that the security threats have also increased. Hence,…”
Get full text
Journal Article -
9
Hybrid Rule based Classification of Attacks in Internet of Things (IoT) Intrusion Detection System
Published in 2023 7th International Conference on Computing Methodologies and Communication (ICCMC) (23-02-2023)“…When dealing with any kind of network traffic, an intrusion detection system is the essential element of security. This also applies to the Internet of Things…”
Get full text
Conference Proceeding -
10
De-noising of images from salt and pepper noise using hybrid filter, fuzzy logic noise detector and genetic optimization algorithm (HFGOA)
Published in Multimedia tools and applications (01-02-2020)“…The main objective of image de-noising is to remove the noise present in the noisy image. Like that, main objective of proposed methodology is to restore the…”
Get full text
Journal Article -
11
RETRACTED ARTICLE: An adaptive neuro-fuzzy logic based jamming detection system in WSN
Published in Soft computing (Berlin, Germany) (01-04-2019)“…Wireless sensor network (WSN) is employed in variety of applications ranging from agriculture to military. WSN is vulnerable to various security attacks, in…”
Get full text
Journal Article -
12
A Scrutiny of Privacy and Security Issues in Fog Computing Environment
Published in 2022 3rd International Conference on Smart Electronics and Communication (ICOSEC) (20-10-2022)“…The current technological improvements of IoT devices result in a significant volume of data being generated. Traditional cloud-based systems store all data in…”
Get full text
Conference Proceeding -
13
Corrigendum to: “Multilevel scheduling mechanism for a stochastic fog computing environment using the HIRO model and RNN” [Sustainable Computing: Informatics and Systems Volume 39, September (2023)100887]
Published in Sustainable computing informatics and systems (01-09-2024)Get full text
Journal Article -
14
Binary bat algorithm based feature selection with deep reinforcement learning technique for intrusion detection system
Published in Soft computing (Berlin, Germany) (01-08-2023)“…The new generation of Intrusion Detection Systems (IDS) progressively requires automatic and intellectual network ID strategies for managing security risks…”
Get full text
Journal Article -
15
Provisioning a cross-domain recommender system using an adaptive adversarial network model
Published in Soft computing (Berlin, Germany) (01-12-2023)“…Recommender system (RS) aims to predict user preferences based on automatic data acquisition, and those collected data assist in achieving the final decision…”
Get full text
Journal Article -
16
-
17
Retraction Note: An adaptive neuro-fuzzy logic based jamming detection system in WSN
Published in Soft computing (Berlin, Germany) (15-10-2024)Get full text
Journal Article -
18
Retraction Note: Improving the prediction rate of unusual behaviors of animal in a poultry using deep learning technique
Published in Soft computing (Berlin, Germany) (01-11-2024)Get full text
Journal Article -
19
RETRACTED ARTICLE: Improving the prediction rate of unusual behaviors of animal in a poultry using deep learning technique
Published in Soft computing (Berlin, Germany) (01-10-2020)“…Poultry farms across the world house animals such as cows, sheep’s, pigs and hen These farms are the places from where the market gets meat, eggs, wool and…”
Get full text
Journal Article -
20
Mitigating the traffic in a cloud using clustering
Published in IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012) (01-03-2012)“…Internet traffic measurement and analysis have been usually performed on a high performance server that collects and examines packet or flow traces. However,…”
Get full text
Conference Proceeding