Govind P. Gupta
YOU?
Author Swipe
View article: Exploring the Therapeutic Potential of Ashwagandha (Withania somnifera) in Alleviating Stress and Anxiety
Exploring the Therapeutic Potential of Ashwagandha (Withania somnifera) in Alleviating Stress and Anxiety Open
Background: Stress is a known causative factor in modulating cognitive health, on which the overall well-being and quality of life are dependent. Long-term stress has shown to disrupt the balance of the hypothalamic–pituitary–adrenal (HPA)…
View article: Development of Primary and Secondary Healthcare Services in Rajasthan: A Review Study
Development of Primary and Secondary Healthcare Services in Rajasthan: A Review Study Open
The development of healthcare services in Rajasthan is crucial for the state's social and economic structure, particularly in the context of primary and secondary healthcare services. This research paper presents a review study based on th…
View article: An Efficient Malware Detection Framework for Enhancing Software Security in Resource-Constrained Systems
An Efficient Malware Detection Framework for Enhancing Software Security in Resource-Constrained Systems Open
View article: Semantic-Aware Hybrid Deep Learning Model for Brain Tumor Detection and Classification Using Adaptive Feature Extraction and Mask-RCNN
Semantic-Aware Hybrid Deep Learning Model for Brain Tumor Detection and Classification Using Adaptive Feature Extraction and Mask-RCNN Open
A brain tumor is one of the most prevalent causes of cancer death. The best strategy is the timely treatment of brain tumors in their early detection. Magnetic Resonance Imaging (MRI) is a standard non-invasive method to detect brain tumor…
View article: Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: A comprehensive review
Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: A comprehensive review Open
The ever-increasing growth of online services and smart connectivity of devices have posed the threat of malware to computer system, android-based smart phones, Internet of Things (IoT)-based systems. The anti-malware software plays an imp…
View article: An Efficient Cyber Assault Detection System using Feature Optimization for IoT-based Cyberspace
An Efficient Cyber Assault Detection System using Feature Optimization for IoT-based Cyberspace Open
With the exponential growth in connected smart devices that interchange sensitive, crucial, and personal data over the Internet of Things (IoT)-based cyberspace, IoT becomes undefended to cyber assaults. Intrusion Detection System (IDS) is…
View article: A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks
A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks Open
Internet of Things (IoT) enabled networks are highly vulnerable to cyber threats due to insecure wireless communication, resource constraint architecture, different types of IoT devices, and a high volume of sensor data being transported a…
View article: Hybrid Meta-Heuristic based Feature Selection Mechanism for Cyber-Attack Detection in IoT-enabled Networks
Hybrid Meta-Heuristic based Feature Selection Mechanism for Cyber-Attack Detection in IoT-enabled Networks Open
Today's technologically advanced connected world is mostly reliant on the Internet of Things (IoT)-enabled smart gadgets and easy connectivity. These smart gadgets are more susceptible to malicious practices found in network traffic, which…
View article: Voting-based Ensemble Learning approach for Cyber Attacks Detection in Industrial Internet of Things
Voting-based Ensemble Learning approach for Cyber Attacks Detection in Industrial Internet of Things Open
The Industrial Internet of Things (IIoT) is a fast developing interconnection of smart technologies that have revolutionised the way the industries work by combining sensors and devices by automating their regular operations through Intern…
View article: An optimized and efficient android malware detection framework for future sustainable computing
An optimized and efficient android malware detection framework for future sustainable computing Open
Android-based smart devices cater to services in almost every aspect of our lives like personal, professional, social, banking, business, etc. However, people with increasingly dependent on the smartphone, malicious attacks against these g…
View article: A blockchain-orchestrated deep learning approach for secure data transmission in IoT-enabled healthcare system
A blockchain-orchestrated deep learning approach for secure data transmission in IoT-enabled healthcare system Open
The integration of the Internet of Things (IoT) with traditional healthcare systems has improved quality of healthcare services. However, the wearable devices and sensors used in Healthcare System (HS) continuously monitor and transmit dat…
View article: Brain Tumor Segmentation and Classification in MRI using Clustering and Kernel-Based SVM
Brain Tumor Segmentation and Classification in MRI using Clustering and Kernel-Based SVM Open
Brain tumor and other nervous systems cancer are one of the leading causes of death for many patients. Magnetic resonance imaging (MRI) is the most important medical imaging modality for diagnosing brain tumors and other disorders in the b…
View article: Permissioned Blockchain and Deep Learning for Secure and Efficient Data Sharing in Industrial Healthcare Systems
Permissioned Blockchain and Deep Learning for Secure and Efficient Data Sharing in Industrial Healthcare Systems Open
The industrial healthcare system has enabled the possibility of realizing advanced real-time monitoring of patients and enriched the quality of medical services through data sharing among intelligent wearable devices and sensors. However, …
View article: Correction to: Hybrid meta-heuristic techniques based efficient charging scheduling scheme for multiple Mobile wireless chargers based wireless rechargeable sensor networks
Correction to: Hybrid meta-heuristic techniques based efficient charging scheduling scheme for multiple Mobile wireless chargers based wireless rechargeable sensor networks Open
View article: Framework for Error Detection & its Localization in Sensor Data Stream for reliable big sensor data analytics using Apache Spark Streaming
Framework for Error Detection & its Localization in Sensor Data Stream for reliable big sensor data analytics using Apache Spark Streaming Open
Internet of Things (IoT) is one of the big sources of Big Sensor data in which collected sensor readings often polluted due to corruption and losses of the sensor readings. In Big Sensor data analytics, fast and efficient detection of erro…
View article: Load Balanced Node Clustering scheme using Improved Memetic Algorithm based Meta-heuristic Technique for Wireless Sensor Network
Load Balanced Node Clustering scheme using Improved Memetic Algorithm based Meta-heuristic Technique for Wireless Sensor Network Open
In Wireless Sensor Network (WSN), the formation of the load-balanced clusters of the sensor nodes is very burning research issue. Most of the existing node clustering schemes suffer from energy-hole and non-uniform load assignment problems…
View article: Oscillator Strengths and Lifetimes in P V, S VI and Cl VII
Oscillator Strengths and Lifetimes in P V, S VI and Cl VII Open
Energy levels as well as oscillator strengths and transition probabilities for transitions among the terms belonging to configurations within the principal quantum number n = 6 of Na-like phosphorous, sulphur, and chlorine are computed usi…
View article: Improved Cuckoo Search-based Clustering Protocol for Wireless Sensor Networks
Improved Cuckoo Search-based Clustering Protocol for Wireless Sensor Networks Open
In a large-scale Wireless Sensor Networks (WSNs), designing of an energy efficient data gathering protocol has become a challenging research issues. This is due to fact that each sensor node is generally equipped with limited energy resour…
View article: A weighted centroid localization algorithm for randomly deployed wireless sensor networks
A weighted centroid localization algorithm for randomly deployed wireless sensor networks Open
Localization is one of the important requirements in wireless sensor networks for tracking and analyzing the sensed data/events. In most of the applications of wireless sensor networks, the event information without its location informatio…
View article: A Framework for Fast and Efficient Cyber Security Network Intrusion Detection Using Apache Spark
A Framework for Fast and Efficient Cyber Security Network Intrusion Detection Using Apache Spark Open
Due to increase in internet based services, the size of network traffic data has become so large and complex that it is very difficult to process with the traditional data processing tools. Fast and efficient cyber security intrusion detec…