Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Bi-level optimization of resource allocation and appliance scheduling in residential areas using a Fog of Things (FOT) framework

    Fog computing has become a state-of-art technology for cloud applications in collaboration with physical IOT devices on the edge of the network.We propose a Fog of Things (FOT) framework for optimized resource...

    Ankur Jain, Chandrashekar Jatoth, G. R. Gangadharan in Cluster Computing (2024)

  2. No Access

    Article

    An extended lightweight blockchain based collaborative healthcare system for fraud prevention

    Multiple benefits (submitting healthcare bills to one or more organizations) and data breaches (tampering of healthcare data by healthcare organization authorities) are typical frauds happening due to the cent...

    Lavanya Settipalli, G. R. Gangadharan, Sivaiah Bellamkonda in Cluster Computing (2024)

  3. No Access

    Article

    Mental stress detection from ultra-short heart rate variability using explainable graph convolutional network with network pruning and quantisation

    This study introduces a novel pruning approach based on explainable graph convolutional networks, strategically amalgamating pruning and quantisation, aimed to tackle the complexities associated with existing ...

    V. Adarsh, G. R. Gangadharan in Machine Learning (2024)

  4. Article

    Open Access

    Multimodal classification of Alzheimer's disease and mild cognitive impairment using custom MKSCDDL kernel over CNN with transparent decision-making for explainable diagnosis

    The study presents an innovative diagnostic framework that synergises Convolutional Neural Networks (CNNs) with a Multi-feature Kernel Supervised within-class-similar Discriminative Dictionary Learning (MKSCDD...

    V. Adarsh, G. R. Gangadharan, Ugo Fiore, Paolo Zanetti in Scientific Reports (2024)

  5. No Access

    Article

    Provider profiling and labeling of fraudulent health insurance claims using Weighted MultiTree

    Recently, healthcare organizations getting engross in digitizing the health insurance system. Besides its undeniable benefits, the risk of exaggerating a claim or entirely fabricating one by providers is incre...

    Lavanya Settipalli, G. R. Gangadharan in Journal of Ambient Intelligence and Humani… (2023)

  6. No Access

    Chapter

    An Enhanced Model for Fake News Detection in Social Media Using Hybrid Text Representation

    In today’s digital age, the majority of people obtain their news via the Internet and social media. However, it is difficult to identify which sources are reliable and which are disseminating false information...

    Dharmesh Singh, Lavanya Settipalli in Emerging IT/ICT and AI Technologies Affect… (2023)

  7. No Access

    Article

    SecAuth-SaaS: a hierarchical certificateless aggregate signature for secure collaborative SaaS authentication in cloud computing

    Collaborative cloud business models enable a new dimension of business by giving option to the third party software vendors to deploy their software in the cloud for offering software as a service (SaaS) to th...

    Deepnarayan Tiwari, G. R. Gangadharan in Journal of Ambient Intelligence and Humani… (2021)

  8. No Access

    Chapter and Conference Paper

    An Optimal Wavelet Detailed-Coefficient Determination Using Time-Series Clustering

    Time-series clustering is used to find out similar patterns which occur in a time-series data. Time-series sequences are characterized by many features. The trend and seasonality, for instance, are the two imp...

    C. I. Johnpaul, Munaga V. N. K. Prasad in Advances in Artificial Intelligence and Da… (2021)

  9. No Access

    Chapter

    Energy-Efficient Resource Allocation in Data Centers Using a Hybrid Evolutionary Algorithm

    Energy efficient scheduling in a cloud data center aims at effectively utilizing available resources and improving the energy utilization. Resource scheduling is NP-hard and often requires substantial computat...

    V. Dinesh Reddy, G. R. Gangadharan in Machine Learning for Intelligent Decision … (2020)

  10. No Access

    Article

    SELCLOUD: a hybrid multi-criteria decision-making model for selection of cloud services

    With the growing demand and commercial availability of cloud services, the need for comparison of their functionality against different prices and performance has arisen. A relevant and fair comparison is stil...

    Chandrashekar Jatoth, G. R. Gangadharan, Ugo Fiore, Rajkumar Buyya in Soft Computing (2019)

  11. No Access

    Article

    Energy-aware virtual machine allocation and selection in cloud data centers

    Data centers evolve constantly in size, complexity, and power consumption. Energy management in cloud data centers is a critical and challenging research issue. It becomes necessary to minimize the operational...

    V. Dinesh Reddy, G. R. Gangadharan, G. Subrahmanya V. R. K. Rao in Soft Computing (2019)

  12. No Access

    Reference Work Entry In depth

    Legal Implications of Social Networks

    Davide Maria Parrilli, G. R. Gangadharan in Encyclopedia of Social Network Analysis an… (2018)

  13. No Access

    Chapter and Conference Paper

    Modeling and Analyzing Multistage Attacks Using Recursive Composition Algebra

    This paper proposes a multistage attack modeling technique based on the recursive composition algebra ( \(RCA_{MA}\) ...

    Ghanshyam S. Bopche, Gopal N. Rai, B. M. Mehtre in Information Systems Security (2018)

  14. No Access

    Article

    Evaluating the efficiency of cloud services using modified data envelopment analysis and modified super-efficiency data envelopment analysis

    Several cloud services with comparable functionality are now available to customers at different prices and performance levels. Often, there may be trade-offs among different functional and non-functional requ...

    Chandrashekar Jatoth, G. R. Gangadharan, Ugo Fiore in Soft Computing (2017)

  15. No Access

    Living Reference Work Entry In depth

    Legal Implications of Social Networks

    Davide Maria Parrilli, G. R. Gangadharan in Encyclopedia of Social Network Analysis an…

  16. No Access

    Chapter and Conference Paper

    Architectural Characterization of Web Service Interaction Verification

    Web service interaction utilizes disparate models as it still does not have its own model for verification process. Adaptation of a different model is not always beneficial as it may prune several significant ...

    Gopal N. Rai, G. R. Gangadharan in Proceedings of 3rd International Conferenc… (2016)

  17. No Access

    Chapter and Conference Paper

    QoS-Aware Web Service Composition Using Quantum Inspired Particle Swarm Optimization

    Quality of Service (QoS)-aware web service composition is one of the challenging problems in service oriented computing. Due to the seamless proliferation of web services, it is difficult to find an optimal we...

    Chandrashekar Jatoth, G. R. Gangadharan in Intelligent Decision Technologies (2015)

  18. No Access

    Chapter and Conference Paper

    Secure Sharing of Data in Cloud Computing

    Cloud computing is emerging as an increasingly popular computing paradigm. Sharing of data in the cloud environments raises the issues of confidentiality, integrity, and availability. In this paper, we propose...

    Deepnarayan Tiwari, G. R. Gangadharan in Security in Computing and Communications (2015)

  19. No Access

    Chapter and Conference Paper

    Fitness Metrics for QoS-Aware Web Service Composition Using Metaheuristics

    Quality of Service (QoS)-aware composition of web services is significant field of research, moving towards heuristic solutions based on soft computing techniques. However, the existing solution are specific t...

    Chandrashekar Jatoth, G. R. Gangadharan in Intelligent Decision Technologies (2015)

  20. No Access

    Reference Work Entry In depth

    Legal Implications of Social Networks

    Davide Maria Parrilli, G. R. Gangadharan in Encyclopedia of Social Network Analysis an… (2014)

previous disabled Page of 2