Gurvinder Singh

ORCID: 0000-0003-3323-1086
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Distributed and Parallel Computing Systems
  • Bipolar Disorder and Treatment
  • Network Security and Intrusion Detection
  • COVID-19 and Mental Health
  • Internet Traffic Analysis and Secure E-voting
  • Schizophrenia research and treatment
  • Sentiment Analysis and Opinion Mining
  • Treatment of Major Depression
  • Mental Health Treatment and Access
  • Parallel Computing and Optimization Techniques
  • Advanced Malware Detection Techniques
  • Scheduling and Optimization Algorithms
  • IoT and Edge/Fog Computing
  • COVID-19 Pandemic Impacts
  • Metaheuristic Optimization Algorithms Research
  • Artificial Intelligence in Healthcare
  • Web Data Mining and Analysis
  • Machine Learning in Bioinformatics
  • Topic Modeling
  • Data Management and Algorithms
  • Digital Media Forensic Detection
  • Epilepsy research and treatment
  • Mental Health Research Topics
  • Digital Mental Health Interventions

All India Institute of Medical Sciences
2022-2024

Chitkara University
2024

Central University of Punjab
2023-2024

All India Institute of Medical Sciences Bhopal
2023-2024

Lovely Professional University
2023-2024

Indian Cancer Society
2024

All India Institute of Medical Sciences Raipur
2023-2024

Guru Nanak Dev University
2013-2023

Government Medical College and Hospital
2003-2023

ESIC Hospital
2023

Abstract Words and phrases bespeak the perspectives of people about products, services, governments events on social media. Extricating positive or negative polarities from media text denominates task sentiment analysis in field natural language processing. The exponential growth demands for business organizations governments, impel researchers to accomplish their research analysis. This paper leverages four state-of-the-art machine learning classifiers viz. Naïve Bayes, J48, BFTree OneR...

10.1186/s13673-017-0116-3 article EN cc-by Human-centric Computing and Information Sciences 2017-09-06

Breast cancer is a crucial reason for death in females. Early recognition of this disease with the assistance mammography reduces rate. Deep learning (DL) an approach being utilized and requested by radiologist that assists them making accurate diagnosis helps to improve outcome predictions. This paper includes new approach, applied on Mini-MIAS dataset 322 images, involving pre-processing method inbuilt feature extraction using K-mean clustering Speed-Up Robust Features (SURF) selection. A...

10.1016/j.imu.2019.01.001 article EN cc-by-nc-nd Informatics in Medicine Unlocked 2019-01-01

10.1016/j.jisa.2015.11.001 article EN Journal of Information Security and Applications 2015-12-16

Nowadays, overwhelming stock data is available, which areonly of use if it properly examined and mined. In this paper, the last twelve years ICICI Bank’s have been extensively using statistical supervised learning techniques. This study may be great interest for those who wish to mine or banks any financial organization. Different measures computed explore nature, range, distribution, deviation data. The different descriptive assist in finding valuable metrics such as mean, variance,...

10.3390/data3040054 article EN cc-by Data 2018-11-24

Breast cancer is an important cause of death in females. Early recognition this disease with the assistance mammography reduces rate. Deep learning (DL) approach being utilized and requested by radiologists to assist making accurate diagnosis, it can help improve outcome predictions. This paper includes a new approach, applied on Mini-MIAS dataset 322 images, involving pre-processing method inbuilt feature extraction using K-means clustering for Speed-Up Robust Features (SURF) selection. A...

10.1016/j.imu.2019.100239 article EN cc-by-nc-nd Informatics in Medicine Unlocked 2019-01-01

Background: Building an effective Intrusion detection system in a multi-attack classification environment is challenging due to the diversity of modern, sophisticated attacks. High-performance methods are needed for Detection Systems as attackers can establish intrusive and easily evade tools deployed computing environment. Moreover, it use single classifier efficiently detect all kinds Aims: To propose unique ensemble framework that effectively different attack categories. Method: The...

10.1109/access.2021.3116219 article EN cc-by-nc-nd IEEE Access 2021-01-01

The research paper discusses various challenges related to Internet of Things implementation into the healthcare sector, for example data resource management, security, loss privacy, access control, and stakeholder collaboration. In future thing is going be an integral part patient’s diagnosis, treatment, recovery, monitoring process. It estimated that a large number objects will connected network. All these devices generate unstructured data; must processed in time-critical manner....

10.48175/ijarsct-22976 article EN International Journal of Advanced Research in Science Communication and Technology 2025-01-12

In parallel computing, Interconnection networks are very crucial for efficient communication among all processors within a similar system. Parallel computing has become topic in the concern of computer science and also it is revealed to be critical when researching high performance. The evolution architectures towards an improved number nodes, where parallelism could approach option speeding up algorithm last few decades. Efficient data transfer between essential component any large scale...

10.48175/ijarsct-23085 article EN International Journal of Advanced Research in Science Communication and Technology 2025-01-25

Background: Stigma is very common among caregivers of patients with severe mental disorder; however, there lack national level data from India. Aim: To assess affiliate stigma and its correlates disorders. Method: For this, schizophrenia ( N = 707), bipolar disorder 344) recurrent depressive 352) were assessed on scale for Caregivers People Mental Illness General Health Questionnaire. Results: reported significantly higher than disorder. Caregiver greater the Higher caregiver in all...

10.1177/0020764017709484 article EN International Journal of Social Psychiatry 2017-05-24

Abstract Background The ever increasing sophistication of intrusion approaches has led to the dire necessity for developing Intrusion Detection Systems with optimal efficacy. However, existing have been developed using outdated attack datasets, more focus on prediction accuracy and less latency. smart System framework evolution looks forward designing deploying security systems that use various parameters analyzing current dynamic traffic trends are highly time-efficient in predicting...

10.1186/s40537-021-00498-8 article EN cc-by Journal Of Big Data 2021-08-21

Background : Depression, anxiety, cognitive impairment, sleep disturbances are common neuropsychiatric manifestations in Parkinson's disease (PD). Aims To compare the prevalence and severity of depression PD with a group patients other chronic medical illnesses ascertain relationship disability quality life PD. Settings Design Hospital-based prospective case-control study. Patients Methods Forty-six 30 non-PD controls having conditions were studied. All assessed by Beck Depression Inventory...

10.4103/0028-3886.79133 article EN Neurology India 2011-01-01

Morphological processing of Indian languages is one the most escalating fields in era Natural Language Processing (NLP) since last decade. The evaluation Asian a highly relevant field times text mining and information retrieval. morphological can be employed for extraction classification knowledge. This paper amalgamates sentiment prediction Punjabi language text. textual data concerned with farmer suicide cases reported Punjab state India. pre-processing phase this study involves...

10.1016/j.jksuci.2018.04.003 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2018-04-07

Pelican-Optimization Algorithm is a revolutionary meta-heuristic algorithm influenced by societal activities and stalking ability of pelicans. The ingenious chaotic variations POA have been created to address the challenge feature-selection for occupational stress diagnosis. In this manuscript, six different maps deployed enhance its performance. Moreover, variants' performance has contrasted with original POA. It observed from results that CPOA_4(Chaotic Pelican Optimization Iterative map)...

10.1016/j.procs.2023.01.128 article EN Procedia Computer Science 2023-01-01

Query optimization is a stimulating task of any database system. A number heuristics have been applied in recent times, which proposed new algorithms for substantially improving the performance query. The hunt better solution still continues. imperishable developments field Decision Support System (DSS) databases are presenting data at an exceptional rate. massive volume DSS consequential only when it able to access and analyze by distinctive researchers. Here, innovative stochastic...

10.1016/j.eij.2015.10.003 article EN cc-by-nc-nd Egyptian Informatics Journal 2015-11-20
Coming Soon ...