G. M. Siddesh
YOU?
Author Swipe
View article: Suspicious behaviour detection in multilayer social networks using PF-KMA and SS-GAE techniques
Suspicious behaviour detection in multilayer social networks using PF-KMA and SS-GAE techniques Open
Multilayer Social networks are an important part of human life to interact on different networks at the same time. Due to the openness of such networks, they become a platform for spammers to spread malicious behaviors. Hence, there is an …
View article: Analysis and Recommendation of Outdoor Activities for Smart City Users Based on Real-Time Contextual Data
Analysis and Recommendation of Outdoor Activities for Smart City Users Based on Real-Time Contextual Data Open
Smart cities leverage advanced technologies to enhance urban living through the real-time collection, processing, and analysis of contextual information. The potential to improve residents’ outdoor experiences in these cities increases dra…
View article: Forecasting Stock Market Volume Price Using Sentimental and Technical Analysis
Forecasting Stock Market Volume Price Using Sentimental and Technical Analysis Open
The stock market volume and price are active areas of research. Behind every dollar of investment, the customer will be hoping for profit in one or the other way. There is a positive correlation between investor sentiment and stock volume.…
View article: ObjectDetect: A Real‐Time Object Detection Framework for Advanced Driver Assistant Systems Using YOLOv5
ObjectDetect: A Real‐Time Object Detection Framework for Advanced Driver Assistant Systems Using YOLOv5 Open
In the recent times, there has been a lot of speculation related to advanced driver‐assistance system (ADAS) which provides best driving experience for the drivers. ADAS technology helps to detect the unhealthy driving conditions which lea…
View article: Classification of Gene Expression Data Using Feature Selection Based on Type Combination Approach Model With Advanced Feature Selection Technology
Classification of Gene Expression Data Using Feature Selection Based on Type Combination Approach Model With Advanced Feature Selection Technology Open
A key step in addressing the classification issue was the selection of genes for removing redundant and irrelevant genes. The proposed Type Combination Approach –Feature Selection(TCA-FS) model uses the efficient feature selection methods,…
View article: Hybrid Approach for Enhancing Performance of Genomic Data for Stream Matching
Hybrid Approach for Enhancing Performance of Genomic Data for Stream Matching Open
In gene expression analysis, the expression levels of thousands of genes are analyzed, such as separate stages of treatments or diseases. Identifying particular gene sequence pattern is a challenging task with respect to performance issues…
View article: Risk Measurement and Cyber security in Industrial Control Systems
Risk Measurement and Cyber security in Industrial Control Systems Open
In this new era of expansion in the cyber space, it is not just the IT domain that is vulnerable to cyber-attacks but also the Industrial Control Systems (ICS). ICS is vital in the functioning of almost all the industries either directly o…
View article: A Novel Approach of Symmetric Key Cryptography using Genetic Algorithm Implemented on GPGPU
A Novel Approach of Symmetric Key Cryptography using Genetic Algorithm Implemented on GPGPU Open
The world of digital communication consists of various applications which uses internet as the backbone for communication. These applications consist of data related to the users of the application, which is confidential and integrity need…
View article: Optimized Focused Web Crawler with Natural Language Processing Based Relevance Measure in Bioinformatics Web Sources
Optimized Focused Web Crawler with Natural Language Processing Based Relevance Measure in Bioinformatics Web Sources Open
In the fast growing of digital technologies, crawlers and search engines face unpredictable challenges. Focused web-crawlers are essential for mining the boundless data available on the internet. Web-Crawlers face indeterminate latency pro…
View article: Data Visualization in R
Data Visualization in R Open
Data visualization helps the users to understand the relationships and associations between information. Visualization helps in minimizing the errors generated during decision making. Different visualization methods have been developed to …
View article: Confidentiality and Safekeeping Problems and Techniques in Fog Computing
Confidentiality and Safekeeping Problems and Techniques in Fog Computing Open
Fog computing is an extension of cloud computing, and it is one of the most important architypes in the current world. Fog computing is like cloud computing as it provides data storage, computation, processing, and application services to …