Gyanendra Prasad Joshi

Gyanendra Prasad Joshi
Sejong University | sejong · Department of Computer Science and Engineering

PhD

About

127
Publications
40,886
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,059
Citations
Introduction
Gyanendra Prasad Joshi is an Assistant Professor in the Department of Computer Science and Engineering at Sejong University. He has previously been a visiting Assistant Professor at Case School of Engineering, CWRU, USA, and a Researcher in the Department of Applied Mathematics at Kongju National University. Between 2012 and 2018 he was an Assistant Professor in the Department of Information and Communication Engineering at Yeungnam University, Korea. http://home.sejong.ac.kr/~joshi/
Additional affiliations
March 2019 - present
Sejong University
Position
  • Professor (Assistant)
March 2018 - February 2019
Case Western Reserve University
Position
  • Professor (Assistant)
March 2011 - February 2018
Yeungnam University
Position
  • Professor (Assistant)
Education
March 2008 - February 2012
Yeungnam University
Field of study
  • Communication Engineering

Publications

Publications (127)
Article
Full-text available
The vehicular ad hoc network is an emerging area of technology that provides intelligent transportation systems with vast advantages and applications. Frequent disconnections between the vehicular nodes due to high-velocity vehicles impact network performance. This can be addressed by efficient clustering techniques. Several recent studies have att...
Article
Full-text available
The purpose of this article is to examine the server activation policy (SAP) in a multi-server queuing-inventory system (MQIS). The queue has a total of c number of multi-threshold stages as well as c-homogeneous servers. The activation of each server begins one by one if there is an adequate queue length and inventory in the system; otherwise, the...
Article
Full-text available
Vehicular technology has recently gained increasing popularity, and autonomous driving is a hot topic. To achieve safe and reliable intelligent transportation systems, accurate positioning technologies need to be built to factor in the different types of uncertainties such as pedestrian behavior, random objects, and types of roads and their setting...
Article
A set S ⊆ V in a graph G is a MED-set if every vertex in V - S has a monophonic eccentric vertex in S. The MED-number γ me (G) is the cardinality of a minimum MED-set of G. A set S ⊆ V in a graph G is a CMED-set if S is a MED-set and the induced subgraph is connected. The CMED-number γ cme (G) is the cardinality of a minimum CMED-set of G. We inves...
Article
Full-text available
This paper explores the random environment with two classes of suppliers and impulse customers. The system’s greatest inventory size is S, and it has an infinitely large orbit. In this case, there are two categories of suppliers: temporary suppliers and regular suppliers. Whenever the inventory approaches r, we place on order Q1 (=S−r) unit items t...
Article
Full-text available
In recent times, real time wireless networks have found their applicability in several practical applications such as smart city, healthcare, surveillance, environmental monitoring, etc. At the same time, proper localization of nodes in real time wireless networks helps to improve the overall functioning of networks. This study presents an Improved...
Article
Full-text available
Traditional Wireless Sensor Networks (WSNs) comprise of cost-effective sensors that can send physical parameters of the target environment to an intended user. With the evolution of technology, multimedia sensor nodes have become the hot research topic since it can continue gathering multi-media content and scalar from the target domain. The existe...
Article
Full-text available
The use of a Markovian inventory system is a critical part of inventory management. The purpose of this study is to examine the demand for two commodities in a Markovian inventory system, one of which is designated as a major item (Commodity-I) and the other as a complimentary item (Commodity-II). Demand arrives according to a Poisson process, and...
Article
Full-text available
Breast cancer is the major cause behind the death of women worldwide and is responsible for several deaths each year. Even though there are several means to identify breast cancer, histopathological diagnosis is now considered the gold standard in the diagnosis of cancer. However, the difficulty of histopathological image and the rapid rise in work...
Article
Full-text available
This research analyses the performance of a perishable queueing-inventory system for two commodities with optional customers demands. We assume in the article that all customers who come to the system can only purchase the first item or the second item or service (they do not purchase both items). This is the original aspect of the paper. We show t...
Article
Full-text available
Optimization of the energy efficiency, fairness, and rates of the system is a vital part of communication systems. Multiple access techniques have a huge potential to enhance such performance parameters. This paper studies the performance of NOMA and OMA systems in a singular cell environment, where the cellular users are distributed randomly, and...
Article
Full-text available
In this paper, we analyze a queueing–inventory system with two classes of customers, high priority (HP) and low priority (LP), under the discretionary priority discipline. The LP customers are served in two stages: preliminary service in stage-I and main service in stage-II. In contrast, HP customers require only the main service. Whenever the inve...
Article
Full-text available
In recent times, Internet of Medical Things (IoMT) gained much attention in medical services and healthcare management domain. Since healthcare sector generates massive volumes of data like personal details, historical medical data, hospitalization records, and discharging records, IoMT devices too evolved with potentials to handle such high quanti...
Article
Full-text available
Wireless sensor network (WSN) comprises numerous compact-sized sensor nodes which are linked to one another. Lifetime maximization of WSN is considered a challenging problem in the design of WSN since its energy-limited capacity of the inbuilt batteries exists in the sensor nodes. Earlier works have focused on the design of clustering and routing t...
Article
Full-text available
Digital signatures are unsuitable for specific applications that are sensitive on a personal or commercial level because they are universally verifiable. Jakobsson et al. proposed the Designated Verifier Signature (DVS) system, which only allows the intended verifier to validate a message’s signature. It prohibits the disclosure of a conviction to...
Article
The practice of Deep Convolution neural networks in the field of medicine has congregated immense success and significance in present situations. Previously, researchers have developed numerous models for detecting abnormalities in musculoskeletal radiographs of upper extremities, but did not succeed in achieving respectable accuracy in the case of...
Article
Image processing remains a hot research topic among research communities due to its applicability in several areas. An important application of image processing is the automatic image captioning technique, which intends to generate a proper description of an image in a natural language automated. Image captioning is a recently developed hot researc...
Article
Full-text available
This paper deals with an integrated and interconnected stochastic queuing-inventory system with a fresh item, a returned item, and a refurbished item. This system provides a multi-type service facility to an arriving multi-class customer through a dedicated channel. It sells fresh and refurbished items, buys used items from customers, refurbishes t...
Article
Full-text available
The present study deals with the stock-dependent Markovian demand of a retrial queueing system with a single server and multiple server vacation. The items are restocked under a continuous review (s,Q) ordering policy. When there is no item in the system, the server goes on vacation. Further, any arrival demand permits entry into an infinite orbit...
Article
Full-text available
Due to latest advancements in the field of remote sensing, it becomes easier to acquire high quality images by the use of various satellites along with the sensing components. But the massive quantity of data poses a challenging issue to store and effectively transmit the remote sensing images. Therefore, image compression techniques can be utilize...
Article
Full-text available
People can store their data on servers in cloud computing and allow public users to access data via data centers. One of the most difficult tasks is to provide security for the access policy of data, which is also needed to be stored at cloud servers. The access structure (policy) itself may reveal partial information about what the ciphertext cont...
Article
Full-text available
The COVID-19 pandemic has spread to almost all countries of the World and affected people both mentally and economically. The primary motivation of this research is to construct a model that takes reviews or evaluations from several people who are affected with COVID-19. As the number of cases has accelerated day by day, people are becoming panicke...
Article
Full-text available
As a standard digital signature may be verified by anybody, it is unsuitable for personal or economically sensitive applications. The chameleon signature system was presented by Krawczyk and Rabin as a solution to this problem. It is based on a hash then sign model. The chameleon hash function enables the trapdoor information holder to compute a me...
Article
Full-text available
This article discusses the queueing-inventory model with a cancellation policy and two classes of customers. The two classes of customers are named ordinary and impulse customers. A customer who does not plan to buy the product when entering the system is called an impulse customer. Suppose the customer enters into the system to buy the product wit...
Article
Full-text available
In recent times, the Internet of Things and big data analytics have become a hot research topic in mobile edge computing (MEC) desires wide-ranging research works for intelligent decision making. In this view, this paper designs an intelligent outlier detection with machine learning empowered big data analytics (IODML-BDA) for MEC. The proposed mod...
Article
Full-text available
Recently, unmanned aerial vehicles (UAVs) have been used in several applications of environmental modeling and land use inventories. At the same time, the computer vision-based remote sensing image classification models are needed to monitor the modifications over time such as vegetation, inland water, bare soil or human infrastructure regardless o...
Article
Full-text available
In response to the digital revolution, nowadays, many companies operate online and offline businesses in parallel to ensure their future competitiveness. This research examines the inventory strategy for multi-product vendor-buyer supply chain systems, considering space constraints and carbon emissions, in order to improve competence in managing on...
Article
It is a non-deterministic challenge on a fog computing network to schedule resources or jobs in a manner that increases device efficacy and throughput, diminishes reply period, and maintains the system well-adjusted. Using Machine Learning as a component of neural computing, we developed an improved Task Group Aggregation (TGA) overflow handling sy...
Article
Full-text available
Recent developments in wireless networking, big data technologies like 5G networks, healthcare big data analytics, Internet of Things (IoT) and other advanced technologies in wearables and Artificial Intelligence (AI) have enabled the development of intelligent disease diagnosis models. The current study devises a new big data analytic-based featur...
Article
Full-text available
Crime forecasting has been one of the most complex challenges in law enforcement today, especially when an analysis tends to evaluate inferable and expanded crime rates, although a few methodologies for subsequent equivalents have been embraced before. In this work, we use a strategy for a time series model and machine testing systems for crime est...
Article
Full-text available
Caching is one of the most promising areas in the field of future internet architecture like Information-centric Networking, Software Defined Networking, and IoT. In Web caching, most of the web content is readily available across the network, even if the webserver is not reachable. Several existing traditional caching methods and cache replacement...
Article
Full-text available
Consider the Diophantine equation yn=x+x(x+1)+⋯+x(x+1)⋯(x+k), where x, y, n, and k are integers. In 2016, a research article, entitled – ’power values of sums of products of consecutive integers’, primarily proved the inequality n= 19,736 to obtain all solutions (x,y,n) of the equation for the fixed positive integers k≤10. In this paper, we improve...
Article
Financial risk assessment (FRA) is an essential process in financial institutions determining a company’s creditworthiness. This paper introduces a new wrapper feature selection with a clustering-based FRA model to assess the financial status. This study involves three different phases of operations such as feature selection, clustering, and classi...
Article
Full-text available
Diabetic Retinopathy (DR) is a significant blinding disease that poses serious threat to human vision rapidly. Classification and severity grading of DR are difficult processes to accomplish. Traditionally, it depends on ophthalmoscopically-visible symptoms of growing severity, which is then ranked in a stepwise scale from no retinopathy to various...
Article
Full-text available
In present times, a massive quantity of big data has been generated by the Internet of Things (IoT) devices for a wide range of applications. The IoT devices generate an enormous data quantity that is troublesome for data processing and analytics functionalities, which is effortlessly managed by the cloud before the explosive development of the IoT...
Article
Full-text available
In this study, we consider a perishable inventory system that has an (s, Q) ordering policy, along with a finite waiting hall. The single server, which provides an item to the customer after completing the required service performance for that item, only begins serving after N customers have arrived. Impatient demand is assumed in that the customer...
Article
Full-text available
Energy efficiency is considered the major design issue in wireless sensor networks (WSN), which can be addressed using clustering and routing techniques. They are treated as Non-deterministic Polynomial (NP)-hard optimization problems and are solved using metaheuristic algorithms to identify the optimal or near-optimal solutions. With this motivati...
Article
This research examines that proposed social, emotional and functional motivations influence users to interact with other users on SNS, share various information, establish networks and improve communication with acquaintances. It allows users to easily grasp the structure of the content and provide a conveniently accessible and stable interface. Mo...
Article
Full-text available
Present-day queuing inventory systems (QIS) do not utilize two multi-server service channels. We proposed two multi-server service channels referred to as T1S (Type 1 n-identical multi-server) and T2S (Type 2 m-identical multi-server). It includes an optional interconnected service connection between T1S and T2S, which has a finite queue of size N....
Article
Full-text available
Presently, a green Internet of Things (IoT) based energy aware network plays a significant part in the sensing technology. The development of IoT has a major impact on several application areas such as healthcare, smart city, transportation, etc. The exponential rise in the sensor nodes might result in enhanced energy dissipation. So, the minimizat...
Article
Full-text available
Present-day queuing inventory systems (QIS) do not utilize two multi-server service channels. We proposed two multi-server service channels referred to as T1S (Type 1 n-identical multi-server) and T2S (Type 2 m-identical multi-server). It includes an optional interconnected service connection between T1S and T2S, which has a finite queue of size N....
Article
Full-text available
There is an increasing concentration in the influences of nonconventional power sources on power system process and management, as the application of these sources upsurges worldwide. Renewable energy technologies are one of the best technologies for generating electrical power with zero fuel cost, a clean environment, and are available almost thro...
Article
Full-text available
This paper introduces a system capable of real-time video surveillance in low-end edge computing environment by combining object detection tracking algorithm. Recently, the accuracy of object detection has been improved due to the performance of approaches based on deep learning algorithm such as region-based convolutional network, which has two st...
Article
Due to the significant utilization of terrestrial communication, Low Earth Orbit (LEO) satellite network is a critical part of satellite communication networks owing to its several benefits. But the efficient and trustworthy routing for LEO satellite networks (LSNs) is a difficult process because of dynamic topology, adequate link changes, and imba...
Article
Full-text available
Enhancement of Cultural Heritage such as historical images is very crucial to safeguard the diversity of cultures. Automated colorization of black and white images has been subject to extensive research through computer vision and machine learning techniques. Our research addresses the problem of generating a plausible colored photograph of ancient...
Article
Full-text available
Disease diagnosis is the identification of an health issue, disease, disorder, or other condition that a person may have. Disease diagnoses could be sometimes very easy tasks, while others may be a bit trickier. There are large data sets available; however, there is a limitation of tools that can accurately determine the patterns and make predictio...
Article
Full-text available
Disease diagnosis is the identification of an health issue, disease, disorder, or other condition that a person may have. Disease diagnoses could be sometimes very easy tasks, while others may be a bit trickier. There are large data sets available; however, there is a limitation of tools that can accurately determine the patterns and make predictio...
Article
Full-text available
The Internet of Things (IoT) is envisioned as a network of various wireless sensor nodes communicating with each other to offer state-of-the-art solutions to real-time problems. These networks of wireless sensors monitor the physical environment and report the collected data to the base station, allowing for smarter decisions. Localization in wirel...
Article
Full-text available
In recent days, COVID-19 pandemic has affected several people's lives globally and necessitates a massive number of screening tests to detect the existence of the coronavirus. At the same time, the rise of deep learning (DL) concepts helps to effectively develop a COVID-19 diagnosis model to attain maximum detection rate with minimum computation ti...