G. Jose Moses

ORCID: 0000-0003-1695-9737
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Ad Hoc Networks
  • Cloud Computing and Resource Management
  • COVID-19 diagnosis using AI
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Vehicular Ad Hoc Networks (VANETs)
  • Machine Learning in Healthcare
  • Smart Systems and Machine Learning
  • Scheduling and Optimization Algorithms
  • Cooperative Communication and Network Coding
  • Distributed and Parallel Computing Systems
  • Energy Efficient Wireless Sensor Networks
  • Radiomics and Machine Learning in Medical Imaging
  • Opportunistic and Delay-Tolerant Networks
  • Security in Wireless Sensor Networks
  • Anomaly Detection Techniques and Applications
  • Sepsis Diagnosis and Treatment
  • Imbalanced Data Classification Techniques
  • Artificial Intelligence in Healthcare and Education
  • COVID-19 epidemiological studies
  • Heart Failure Treatment and Management
  • Advanced Technologies and Applied Computing
  • Food Supply Chain Traceability
  • Cutaneous Melanoma Detection and Management
  • Smart Cities and Technologies

G. M. Reddy Research Foundation
2025

G Pulla Reddy Dental College & Hospital
2022

Jawaharlal Nehru Technological University, Kakinada
2014

Adikavi Nannaya University
2012

Corona viral disease (COVID-19) has been declared a worldwide pandemic due to its fast spread. In order prevent future infection and protect lives, early detection of COVID-19 cases is crucial because failure do so might result in death. The segmentation patient chest computed tomography (CT) image data proposed this study using the tuned Deep Long Short-Term Memory (Deep-LSTM) classifier by Grey Wolf Grasshopper Optimisation (GWGHO). model accuracy enhanced applying recommended approach...

10.52783/jisem.v10i10s.1534 article EN Journal of Information Systems Engineering & Management 2025-02-01

Cyber-physical system (CPS) incorporates several computing resources, networking units, interconnected physical processes, and monitoring the development application of system. Interconnection between cyber worlds initiates attacks on security problems, particularly with enhancing complications transmission networks. Despite efforts to combat these analyzing detecting cyber-physical from complex CPS is challenging. Machine learning (ML)-researcher workers implemented based techniques examine...

10.1038/s41598-025-91500-3 article EN cc-by-nc-nd Scientific Reports 2025-03-25

Background/Objectives: Cloud computing is a large-scale distributed paradigm in which pool of abstracted, virtualized, dynamically-scalable resources such as power, storage, platforms and services are delivered on demand to external customers over the Internet. In cloud scheduling process deciding how allocate form virtual machines for requested jobs. Methods: The proposed Deadline Aware Two Stage Scheduling schedule Virtual Machines (VM) jobs received from customers. this model each job...

10.17485/ijst/2016/v9i4/80553 article EN Indian Journal of Science and Technology 2016-01-08

Presently, customer retention is essential for reducing churn in telecommunication industry. Customer prediction (CCP) important to predict the possibility of quality services. Since risks also get essential, rise machine learning (ML) models can be employed investigate characteristics behavior. Besides, deep (DL) help behavior based characteristic data. DL necessitate hyperparameter modelling and effort, process difficult research communities business people. In this view, study designs an...

10.32604/cmc.2022.030428 article EN Computers, materials & continua/Computers, materials & continua (Print) 2022-01-01

Bigdata is a challenging field in data processing since the information retrieved from various search engines through internet. A number of large organizations, that use document clustering,fails arranging documents sequentially their machines. Across globe, advanced technologyhas contributed to high speed internet access. But consequences useful yet unorganized machine files seemto be confused retrieval process. Manual ordering has its own complications. In this paper, application software...

10.22452/mjcs.sp2020no1.8 article EN Malaysian Journal of Computer Science 2020-11-27

Scheduling user requests in cloud computing for resource provision is key process computing. In sometimes request has to be processed with a series of virtual machines from the available resources. Each ri (1<=i<=n) environment complete its workflow on machine type VM1 an instance Ti1 units time, later VM2 Ti2 and so on, at end VMm Tim time. using FCFS scheduling highest Average waiting time Total elapsed The present paper presents novel approach by applying Johnson's algorithm reduce...

10.1109/iccctam.2012.6488062 article EN 2012-12-01

Statistics are most crucial than ever due to the accessibility of huge counts data from several domains such as finance, medicine, science, engineering, and so on. Statistical mining (SDM) is an interdisciplinary domain that examines existing databases discover patterns connections data. It varies in classical statistics on size datasets detail could not primarily be gathered based some experimental strategy but conversely for other resolves. Thus, this paper introduces effective statistical...

10.32604/csse.2023.034213 article EN cc-by Computer Systems Science and Engineering 2023-01-01

Skin cancer is one of the most dangerous cancer. Because high melanoma death rate, skin divided into non-melanoma and melanoma. The dermatologist finds it difficult to identify from dermoscopy images lesions. Sometimes, pathology biopsy examinations are required for diagnosis. Earlier studies have formulated computer-based systems detecting lesion images. With recent advancements in hardware software technologies, deep learning (DL) has developed as a potential technique feature learning....

10.32604/csse.2023.038322 article EN cc-by Computer Systems Science and Engineering 2023-01-01

Cloud Computing provides the computing environment where different resources, infrastructures, development platforms and software are delivered as a service to customers virtually on pay-as-use basis. In cloud job request may requires m number of resources types complete its tasks. Scheduling for end users is an important task in computing. this paper we have proposed Multi Stage scheduling schedule Virtual Machines (VM) requested jobs received from customers. We considered model that 'm'...

10.1109/iacc.2016.51 article EN 2016-02-01

We present a novel approach multicast routing protocol using Ant Colony Optimization and Cross Layer Technique. This is an enhancement of the existing on-demand (ODMRP). Establishing communication through portable devices without any central infrastructure possible in Ad-hoc networks. feature absence random mobility give rise to multiple problems involving security routing. The challenges encountered by these protocols are provide secured efficient In this paper we intend With enhanced cross...

10.35940/ijitee.a3941.119119 article EN International Journal of Innovative Technology and Exploring Engineering 2019-11-19

The traditional notion of a Adhoc wireless network is one in which there are few Base Stations or Access Points and number Mobile Nodes.Security has become primary concern order to provide protected communication between mobile nodes hostile environment.The networks pose nontrivial challenges security design, such as open peer-to-peer architecture, shared medium topology.These clearly make case for building multifence solutions that achieve both road protection desirable performance.The...

10.5815/ijcnis.2012.06.04 article EN International Journal of Computer Network and Information Security 2012-06-26

Occult peritoneal metastasis often emerges in sick persons having matured gastric cancer (GC) and is inexpertly detected with presently feasible instruments. Due to the existence of that prevents probability healing crucial operation, there relies upon a discontented requirement for an initial diagnosis accurately recognize occult metastasis. The proffered paradigm this chapter identifies phases GC. phase accompanies metabolomics inspecting biomarkers. If person undergoes signs GC, early...

10.3233/jifs-233510 article EN Journal of Intelligent & Fuzzy Systems 2023-11-02

In the current scenario, feature selection (FS) remains one of very important functions in machine learning. Decreasing set (FSt) assists enhancing classifier's accuracy. Because existence a huge quantity data within dataset (DS), it colossal proced ure for choosing requisite features out DS. Hence, resolving this issue, new Chaos Quasi-Oppositional-based Flamingo Search Algorithm with Simulated Annealing (CQOFSASAA) has been proffered FS and optimum FSt DSs, and, hence, lessens DS'...

10.3233/jifs-233557 article EN Journal of Intelligent & Fuzzy Systems 2023-11-10
Coming Soon ...