@mghr...


Paper-Works

Thesis

Mempool Analysis to Identify Fraudulent Transactions in the Blockchain Network

Keywords:

Mempool, Bitcoin, Fraudulent Transactions, Financial Systems, Crypto Currencies, Attacks, Money Laundering, Unsupervised Learning, Kmeans++, Isolation Forest, Self-Organising Maps, Fraud Prevention, Blockchain

DOI:
NA

PDF:

Download

Citations:

NA                                                                                                                    
            

Articles & Conferences

Real-Time Agriculture Yield Monitor System (AYMS) Using Deep Feedforward (DFF) Neural Network

Keywords:

Machine Learning, Artificial Intelligence (AI), Smart Farming, Deep FeedForward Neural Network(DFF), Distance Monitoring, Internet of Things (IoT)

DOI:
http://dx.doi.org/10.2139/ssrn.3734201

PDF:

Download

Citations:

@article{
    author = {Manoj Athreya C S and Mohith Gowda H R and Amogh Babu K A and Ravishankar R},
    doi = {10.2139/SSRN.3734201},
    journal = {SSRN Electronic Journal},
    month = {11},
    publisher = {Elsevier BV},
    title = {Real-Time Agriculture Yield Monitor System (AYMS) Using Deep Feedforward (DFF) Neural Network},
    url = {https://papers.ssrn.com/abstract=3734201},
    year = {2020},
}
            

Development of Anti-Phishing Browser based on Random Forest and Rule of Extraction Framework

Keywords:

Anti-Phishing Browser, Phishing Attack, Machine Learning, Intelligent Browser Engine, Rule of Extraction Framework, AI Browser Architecture

DOI:
https://doi.org/10.1186/s42400-020-00059-1

PDF:

Download

Citations:

@article{
    Hr2020, 
    author = {Mohith Gowda Hr and Adithya Mv and S. Gunesh Prasad and S. Vinay}, 
    doi = {10.1186/S42400-020-00059-1/TABLES/4}, 
    issn = {25233246}, 
    issue = {1}, 
    journal = {Cybersecurity},  
    month = {12}, 
    pages = {1-14}, 
    publisher = {Springer Science and Business Media B.V.}, 
    title = {Development of anti-phishing browser based on random forest and rule of extraction framework}, 
    volume = {3}, 
    url = {https://cybersecurity.springeropen.com/articles/10.1186/s42400-020-00059-1}, 
    year = {2020}
} 
            

Blogs

Edge Computing : TPH Anomaly Detection using Multilayer Neural Network on ESP32

Keywords:

EDGE - C, Edge Computing, TPH Anomaly Detection, ESP32, ANN, AI & Machine Learning, Tensorflow, Tensorflow Lite

Link:
https://mmohithgowda.medium.com/edge-computing-tph-anomaly-detection-using-multilayer-neural-network-on-esp32-33d08fea00e9

Citations:

@web_page{
    author = {HR Mohith Gowda}, 
    title = {Edge Computing : TPH Anomaly Detection using Multilayer Neural Network on ESP32 | by MohithGowdaHR | Medium}, 
    url = {https://mmohithgowda.medium.com/edge-computing-tph-anomaly-detection-using-multilayer-neural-network-on-esp32-33d08fea00e9}, 
    year = {2020} 
}
            

An Introduction to Edge Computing On ESP32

Keywords:

EDGE - C, Edge Computing, ESP32, ANN, AI & Machine Learning, Tensorflow, Tensorflow Lite

Link:
https://www.hackster.io/edge-c/an-introduction-to-edge-computing-on-esp32-6f3834

Citations:

@web_page{
    author = {S Shiva Shankar and HR Mohith Gowda}, 
    title = {An Introduction to Edge Computing On ESP32 - Hackster.io}, 
    url = {https://www.hackster.io/edge-c/an-introduction-to-edge-computing-on-esp32-6f3834/},                      
    year = {2020}
}