Author of the publication

Person Identification Technique Using RGB Based Dental Images.

, and . CISIM, volume 9339 of Lecture Notes in Computer Science, page 169-180. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GDM: A New Graph Based Data Model Using Functional Abstractionx., , and . J. Comput. Sci. Technol., 21 (3): 430-438 (2006)Dimensionality Reduction of Hyperspectral Images: A Data-Driven Approach for Band Selection., , and . ACSS (2), volume 1136 of Advances in Intelligent Systems and Computing, page 11-27. Springer, (2020)TelePatch: a middle layer for screening device fragmentation., , and . Innov. Syst. Softw. Eng., 13 (4): 251-259 (2017)A new agent based security framework for collaborative cloud environment., , and . CSIIRW, page 76. ACM, (2011)LAR2P: A Location Aided Reactive Routing Protocol for near-optimal route discovery in MANET.. CISIM, page 259-264. IEEE, (2010)A Study on Software Risk Management Strategies and Mapping with SDLC., , and . ACSS (1), volume 396 of Advances in Intelligent Systems and Computing, page 121-138. Springer, (2015)Heterogeneous Services in Layered Framework of IoT Enabled Assisted Living., and . IoTofHealth@MobiSys, page 19-20. ACM, (2016)Poster: Exploring Security as a Service for IoT Enabled Remote Application Framework., and . MobiSys (Companion Volume), page 15. ACM, (2016)Stochastic modelling and pilot data analysis towards provisioning of ambulance for handling emergency., , and . Int. J. Adv. Intell. Paradigms, 11 (3/4): 213-234 (2018)A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud., , , and . CISIM, volume 8838 of Lecture Notes in Computer Science, page 112-121. Springer, (2014)