Search Results - "T, Gireesh Kumar"

Refine Results
  1. 1

    Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN by A, Dhanya K., P, Vinod, Yerima, Suleiman Y., Bashar, Abul, David, Anwin, T, Abhiram, Antony, Alan, Shavanas, Ashil K., T, Gireesh Kumar

    Published in IEEE systems journal (01-06-2023)
    “…The threat of malware in the Internet of Things (IoT) is ever-present given that many IoT systems today rely on the Android operating system. There has been a…”
    Get full text
    Journal Article
  2. 2

    Editorial: Recent developments in oxygen minimum zones biogeochemistry by Bourbonnais, Annie, Valliyodan, Sudheesh, Altabet, Mark A., Jayakumar, Amal, Naqvi, Syed Wajih Ahmad, Kumar T. R., Gireesh

    Published in Frontiers in Marine Science (05-12-2023)
    “…Soetaert et al. investigated the mechanisms causing deep-water renewal events in Saanich inlet, a seasonally anoxic basin in British Columbia, Canada, which…”
    Get full text
    Journal Article
  3. 3

    Conserving knowledge heritage: opportunities and challenges in conceptualizing cultural heritage information system (CHIS) in the Indian context by T.K., Gireesh Kumar, R., Raman Nair

    Published in Global knowledge, memory and communication (21-07-2022)
    “…Purpose The purpose of this paper is to investigate the scope, issues and challenges in conceptualizing a comprehensive cultural heritage information system…”
    Get full text
    Journal Article
  4. 4

    Chemometric study on the trace metal accumulation in the sediments of the Cochin Estuary―Southwest coast of India by Deepulal, P. M., kumar, T. R. Gireesh, Sujatha, C. H., George, Rejomon

    Published in Environmental monitoring and assessment (01-10-2012)
    “…The distribution and accumulation of trace metals in the sediments of the Cochin estuary during the pre-monsoon, monsoon and post-monsoon periods were…”
    Get full text
    Journal Article
  5. 5

    Enhancing data integrity in opportunistic mobile social network: Leveraging Berkle Tree and secure data routing against attacks by Lakshmi, Vimitha R. Vidhya, T, Gireesh Kumar

    Published in Computers & security (01-01-2025)
    “…In Opportunistic Mobile Social Networks (OMSNs), ensuring data integrity is crucial. The anonymous and opportunistic nature of node communication makes these…”
    Get full text
    Journal Article
  6. 6

    Phosphorus fractions in the surface sediments of three mangrove systems of southwest coast of India by Joseph, Manju Mary, Ratheesh Kumar, C. S., Renjith, K. R., Gireesh Kumar, T. R., Chandramohanakumar, N.

    Published in Environmental earth sciences (01-03-2011)
    “…The phosphorus fractions in three tropical mangrove systems of Cochin region were analysed by sequential extraction method. Iron-bound phosphorus was the major…”
    Get full text
    Journal Article
  7. 7

    Behaviour of REEs in a tropical estuary and adjacent continental shelf of southwest coast of India: Evidence from anomalies by DEEPULAL, P M, KUMAR, T R GIREESH, SUJATHA, C H

    Published in Journal of Earth System Science (01-10-2012)
    “…The distribution and accumulation of the rare earth elements (REE) in the sediments of the Cochin Estuary and adjacent continental shelf were investigated. The…”
    Get full text
    Journal Article
  8. 8

    Occurrence of white gelatinous foam on the beaches of Kollam (southwest coast of India) due to the senescent bloom of Phaeocystis globosa by Madhu, N. V., Anil, P., Vishal, C. R., Muraleedharan, K. R., Parvathi, A., Kumar, T. Gireesh, Arya, K. S., Hafza, S.

    Published in Current science (Bangalore) (25-10-2020)
    “…An unusual white gelatinous foam (~2 ft high) was detected on the beaches of Kollam (Mundakkal), Kerala, southwest coast of India. It extended to ~300 m…”
    Get full text
    Journal Article
  9. 9

    Edge Computing Based Secure Healthcare System by G, Souganthika, T, Gireesh Kumar, N, Radhika

    “…The Smart Healthcare System developed based on edge computing is used in diagnosing the patient's disease when the doctor is far away from the patient. It…”
    Get full text
    Conference Proceeding
  10. 10
  11. 11

    Obfuscated Malware detection using Machine Learning models by Balasubramanian, Karthik Manikandan, Vasudevan, Shri Venkatakrishnan, Thangavel, Senthil Kumar, T, Gireesh Kumar, Srinivasan, Kartik, Tibrewal, Anjali, Vajipayajula, Sulakshan

    “…The number of malware attacks has been growing at an alarming rate especially in the recent years. Cyber criminals equip themselves with the latest…”
    Get full text
    Conference Proceeding
  12. 12

    Evaluation of Biochemical and Nutritional Potential of Seaweeds from Lakshadweep Archipelago by Anuradha, V., Byju, K., Jacob, Kala, Gopinath, Anu, Prashob Peter, K. J., Gireesh Kumar, T. R., Vasundhara, G., Rosamine, Emilda, Harishankar, H. S., Kumar, N. C., Nair, S. M.

    Published in Journal of aquatic food product technology (03-10-2015)
    “…The variation of the proximate composition and mineral content of nine seaweeds available in the Lakshadweep group of islands were studied to evaluate their…”
    Get full text
    Journal Article
  13. 13

    Biophysical implications of the freshwater influx over small spatial scale in the coastal waters along the southwest coast of India during the Southwest Monsoon by Santhikrishnan, S., Jyothibabu, R., Albin, K.J., Alok, K.T., Karnan, C., Arunpandi, N., Camey, M.F., Gireesh Kumar, T.R.

    Published in Continental shelf research (01-02-2021)
    “…This study in the coastal waters off Kochi along the southwest coast of India during the Southwest Monsoon (SWM) presents the biophysical implications of…”
    Get full text
    Journal Article
  14. 14

    Comparative Analysis of Deep Learning and Machine Learning models for Network Intrusion Detection by V C, Dharaneish, S, Nithin Kumar, V, Hari Varsha, T, Senthil Kumar, T, Gireesh Kumar, Vajipayajula, Sulakshan

    “…The increasing prevalence of security breaches and malicious software attacks is a major concern in the digital landscape, sparking continued interest in…”
    Get full text
    Conference Proceeding
  15. 15

    A comprehensive survey on Neural Network based Image Data hiding Scheme by Chanchal, M., Malathi, P., Kumar T., Gireesh

    “…The advancement in science and technology has become a significant bottleneck to the information/data. In order to overcome the threats, a number of…”
    Get full text
    Conference Proceeding
  16. 16

    Biogeochemistry of surficial sediments in the intertidal systems of a tropical environment by Joseph, Manju Mary, Kumar, C.S. Ratheesh, Kumar, T.R. Gireesh, Renjith, K. R., Chandramohanakumar, N.

    Published in Chemistry and ecology (01-08-2008)
    “…Variability of nature and composition of organic matter in the surficial sediments of mangrove and estuarine systems of Cochin were investigated. Assessment of…”
    Get full text
    Journal Article
  17. 17

    Identification, documentation and promotion of cultural heritage: problems and prospects in the Indian context by TK Gireesh Kumar

    “…PurposeThe purpose of this paper is to overview the current state of affairs of the Indian heritage treasures, which are being identified, restored, preserved…”
    Get full text
    Journal Article
  18. 18

    Smart Farming based on AI, Edge Computing and IoT by T, Gireesh Kumar, Shashank, Kowtharapu Venkata

    “…With the growth of technology and people's dependency on smartphones, having a technological control over industrial and residential applications using IoT to…”
    Get full text
    Conference Proceeding
  19. 19

    Valorization of intangible cultural heritage through documentation: an Indian scenario by T K, Gireesh Kumar

    Published in Library hi tech news (10-10-2024)
    “…Purpose The aim of this paper is to evaluate the progress of documentation efforts of the country, India in conserving and preserving its intangible cultural…”
    Get full text
    Journal Article
  20. 20

    Enhancing Power Grid Security by Detecting Relay Setting Manipulation Attacks with Machine Learning by Varghese, Samya Rebecca Jiji, Venu, Ankita, Vijaya Chandrakala, K.R.M., Gireesh Kumar, T, Arun Shankar, V.K.

    “…As power grids undergo extensive digitalization, they become susceptible to diverse cybersecurity threats, including potentially manipulating protective relay…”
    Get full text
    Conference Proceeding