Classification of Malware using Deep Learning Techniques P Bagane, SG Joseph, A Singh, A Shrivastava, B Prabha, A Shrivastava 2021 9th International Conference on Cyber and IT Service Management (CITSM …, 2021 | 32 | 2021 |
WSN-IoT clustering for secure data transmission in e-health sector using green computing strategy A Srivastava, A Singh, SG Joseph, M Rajkumar, YD Borole, HK Singh 2021 9th International Conference on Cyber and IT Service Management (CITSM …, 2021 | 30 | 2021 |
Cnn-based early blight and late blight disease detection on potato leaves SG Joseph, MS Ashraf, AP Srivastava, B Pant, A Rana, A Joshi 2022 2nd International Conference on Technological Advancements in …, 2022 | 7 | 2022 |
Deep learning based model for classification of COVID− 19 images for healthcare research progress S Kumar, LCS Redd, SG Joseph, VK Sharma, H Sabireen Materials Today: Proceedings 62, 5008-5012, 2022 | 6 | 2022 |
Denoising of Images using Deep Convolutional Neural Networks (DCNN) SG Joseph, DVP Singh International Journal of Engineering Development and Research (IJEDR), ISSN …, 0 | 5 | |
Advanced honeypot architecture for network threats quantification SG Joseph Int. J. Sci. Eng. Appl. Sci 15, 2395-3470, 2015 | 4 | 2015 |
Quasi-Oppositional Satin Bowerbird with Deep Learning based Content based Image Retrieval DP Singh, SG Joseph, VT Selvi, S Karunakaran, G Appasami, B Jegajothi 2022 6th International Conference on Computing Methodologies and …, 2022 | 3 | 2022 |
Co-Operative Multiple Replica Provable Data Possession for Integrity Verification in Multi-Cloud Storage MSG Joseph International Journal of Engineering And Science 4, 26-31, 2014 | 3 | 2014 |
The Usage of Machine Learning Evolutionary Algorithms in Medical Images Formed by Computer Tomography (CT) or X-Rays to Detect the Infections due to COVID 19 SG Joseph PENSEE (penseeresearch. com) ISSN, 0031-4773, 0 | 3 | |
Automated Drusen Detection and Quantification for Early Identification of Age Related Macular Degeneration in Retinal Images Using Analytical Modelling Algorithms MSG Joseph | 1 | 2015 |
Analysis of the Secure Cloud Framework for Mobile Banking SG Joseph, SS Jadhav, S Sharma, A Poonia, A Shrivastava, S Hemavathi 2021 International Conference on Technological Advancements and Innovations …, 2021 | | 2021 |
An in Depth Analysis of Services of Cloud Computing with Reference to the Business Contrivance S Mr. Zen, J Mr. Susheel, George INTERNATIONAL JOURNAL OF ADVANCED RESEARCH TRENDS IN ENGINEERING AND …, 2021 | | 2021 |
A Block-chain based Enforcement to Reduce Cybercrimes in Digital Forensics Susheel George Joseph, Tincy Thomas, Sahal P Najeeb, Sangeetha Sathyapal Journal for Emerging Technologies and Innovative Research 8 (7), 254-260, 2021 | | 2021 |
The Usage of Machine Learning Evolutionary Algorithms in Medical Images Formed by Computer Tomography (CT) or X-Rays to Detect the Infections due to COVID 19. SG Joseph PENSEE INTERNATIONAL JOURNAL 51 (4), 1512-1518, 2021 | | 2021 |
A Machine Learning(ML) Approach to controlling and monitoring the viral pandemic- Covid 19 SG Joseph Journal for Emerging Technologies and Innovative Research 7 (6), 1709-1717, 2020 | | 2020 |
Denoising of Images using Deep Convolutional Neural Networks (DCNN) SG Joseph, DVP Singh INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH 7 (3), 826-832, 2019 | | 2019 |
Multimodal Medical Image Fusion by Combining Box Filtering and Guided Filtering Techniques using Bi-Linear Interpolation SG Joseph INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH 6 (6), 259-267, 2019 | | 2019 |
The Evolutionary Machine Learning Modelto Detect the COVID 19 Infections due in Medical Images. SGJ MCA, J Singh Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10 (3), 955-961, 2019 | | 2019 |
Lossless Compression of Medical Images using Huffman Algorithm with 3D Predictors and Masking SG Joseph International Journal of Emerging Technologies and Innovative Research 5 (6 …, 2018 | | 2018 |
Audio Signature in Graphical Password Authentication using Click Cued Points SG Joseph International Journal of Research in Information Technology 2 (4), 437- 440, 2014 | | 2014 |