Gautam Siwach

Gautam Siwach
IBM Research · Thomas J. Watson Research Center

Master of Science
Involved in the field of open source technologies and have a focus on cognitive computing and big data.

About

12
Publications
505
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
31
Citations
Introduction
Gautam Siwach is a Distinguished Data Scientist and a Principal executive for Open Source technologies at IBM. He is a Subject Matter Expert and a thought leader in the field of Cognitive computing, and Big Data space on Open Source Platform.

Publications

Publications (12)
Article
Full-text available
In order to address vulnerabilities in LTE security and the objective to strengthen the implementation of encryption and decryption algorithms in LTE, we proposed a method for integration of an algorithm with a dynamic matrix generation scheme of 16*16 elements during AES implementation. Implementing such algorithm eradicates the vulnerability that...
Conference Paper
How much confidence we can have in the interconnected complex systems that we put into production environment? In this paper we will provide the solution for operational readiness of a platform strengthening the backup, restore, network file transfer, failover capabilities and overall security. We provide the evaluation of inducing chaos to a Kuber...
Conference Paper
This quantitaive study provides different methods of visualization for processing Big Data sets in augmented and virtual reality. The goal is to provide the detailed implementation of the statistical methods and modeling techniques i.e. using machine learning algorithms and artificial intelligence. The Statistical analysis is performed on the Big D...
Conference Paper
In this paper we investigate potential vulnerabilities in the implementation of encryption processes within the EEA2 algorithm of Long-Term Evolution (LTE), and we propose an enhancement for the security features in LTE. We show that during the encryption process in EEA2, a leakage of 128 bits of plain text and its corresponding cipher text in a PD...
Conference Paper
This research investigates the practical application of artificial intelligence in digital asset trading to ensure secure transactions on public ledgers. The emphasis lies in predicting prices based on data from digital exchanges, utilizing algorithmic design and seamless automation through APIs across multiple platforms. Additionally, this study e...
Conference Paper
This paper delves into the integration of natural language processing (NLP) within the domain of cyber-physical systems, with a specific focus on collaborative robots (cobots), aiming to unravel the potential enhancements in communication, decision-making, and collaboration between humans and cobots. The primary objective is to conduct a comprehens...
Conference Paper
This paper presents a unique approach to enhance Human-Cobot Interaction using Natural Language Processing. We integrate the CoboVox voice recognition system into the UR3e cobot interface, enabling voice-activated engagement with collaborative robots. Our methodology includes vocabulary building, language processing model analysis, and practical im...
Experiment Findings
An example of an experiment to show how VR can affect social interaction: Experiment Design: Participants: A total of 60 participants will be recruited for the study, with equal numbers of males and females. Equipment: A virtual reality (VR) system with head-mounted displays and hand controllers will be used for the experiment. Procedure: Partici...
Experiment Findings
An example of an experiment to show how VR can affect social interaction: Experiment Design: Participants: A total of 60 participants will be recruited for the study, with equal numbers of males and females. Equipment: A virtual reality (VR) system with head-mounted displays and hand controllers will be used for the experiment. Procedure: Partici...
Conference Paper
Full-text available
In this paper we investigate the key features of big data as formation of clusters and their interconnections along with their connections to the databases. We focused on the security of big data and the actual orientation of the term towards the presence of different type of data in an encrypted form at cloud interface by providing the raw definit...

Network

Cited By