Skip to main content

and
  1. No Access

    Chapter

    A Novel Machine Learning Framework for Covid-19 Image Classification with Bio-heuristic Optimization

    Due to its rapidly advancing spread, the world is still reeling from COVID-19 (coronavirus 2019), which is categorized as a highly infectious disease. An early diagnosis is very critical in treating COVID-19 p...

    Prathap Siddavaatam, Reza Sedaghat in Transactions on Computational Science XXXIX (2022)

  2. No Access

    Chapter

    A New Bio-heuristic Hybrid Optimization for Constrained Continuous Problems

    A novel bio-inspired evolutionary algorithm known as MoFAL is presented in this article. The proposed algorithm (MoFAL) is based on the hybrid amalgamation of two nature inspired methods based on Moth Flame Op...

    Prathap Siddavaatam, Reza Sedaghat in Transactions on Computational Science XXXVIII (2021)

  3. No Access

    Chapter

    Novel Hybrid GWO-WOA and BAT-PSO Algorithms for Solving Design Optimization Problems

    This paper aims at the design and development of two hybrid nature inspired algorithms based on Grey Wolf Optimizer and Whale Optimization Algorithm (GWOWOA) and Binary Bat Optimization Algorithm and Particle ...

    Noel Jose Thengappurackal Laiju in Transactions on Computational Science XXXV… (2021)

  4. No Access

    Article

    A novel multi-objective optimizer framework for TDMA-based medium access control in IoT

    Recently, cross-layer optimization has been emphasized by researchers for Internet of Things (IoT) where billions of devices communicate intelligently making every day communication highly informative. Medium ...

    Prathap Siddavaatam, Reza Sedaghat in CSI Transactions on ICT (2020)

  5. No Access

    Article

    A New Adaptive Security Architecture with Extensible Computation Complexity for Generic Ciphers

    Among recent developments on ciphers, attacks involving polynomial cryptanalysis have gained prominent attention in evaluating encryption algorithms for both stream and block ciphers. Algebraic cryptanalysis i...

    Prathap Siddavaatam, Reza Sedaghat in Journal of Hardware and Systems Security (2019)

  6. No Access

    Chapter

    A Delta-Diagram Based Synthesis for Cross Layer Optimization Modeling of IoT

    Internet of Things is a networking platform where billions of every day devices communicate intelligently making every day communication highly informative. The IoT defines a world-wide cyber-physical system w...

    Prathap Siddavaatam, Reza Sedaghat in Transactions on Computational Science XXXIII (2018)

  7. No Access

    Chapter and Conference Paper

    A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers

    In recent years, attacks involving polynomial cryptanalysis have become an important tool in evaluating encryption algorithms involving stream ciphers. Stream cipher designs are difficult to implement since th...

    Min Hsuan Cheng, Reza Sedaghat, Prathap Siddavaatam in Network and System Security (2016)

  8. No Access

    Chapter and Conference Paper

    Splitting Atoms in Relational Algebras

    Splitting atoms in a relation algebra is a common tool to generate new algebras from old ones. This includes constructing non-representable algebras from representable structures. The known method of splitting...

    Prathap Siddavaatam, Michael Winter in Relational and Algebraic Methods in Computer Science (2011)