Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using PSO in a spatial domain based image hiding scheme with distortion tolerance., , and . Comput. Electr. Eng., 39 (2): 640-654 (2013)An empirical evaluation of cross project priority prediction., , and . Int. J. Syst. Assur. Eng. Manag., 5 (4): 651-663 (2014)Securing fingerprint images using a hybrid technique., , and . ICACCI, page 557-565. ACM, (2012)MARST: Multi-Agent Recommender System for e-Tourism Using Reputation Based Collaborative Filtering., , , and . DNIS, volume 8381 of Lecture Notes in Computer Science, page 189-201. Springer, (2014)Avoiding Threats Using Multi Agent System Planning for Web Based Systems., , , , and . ICCCI, volume 5796 of Lecture Notes in Computer Science, page 709-719. Springer, (2009)A Self-organizing Self-healing On-demand Loop-free Path Routing Protocol Using Mobile Process Groups for Mobile Ad-hoc Networks., and . ARTCom, page 396-400. IEEE Computer Society, (2009)FS-EHS: Harmony Search Based Feature Selection Algorithm for Steganalysis Using ELM., , , and . IBICA, volume 424 of Advances in Intelligent Systems and Computing, page 393-402. Springer, (2015)Predicting the priority of a reported bug using machine learning techniques and cross project validation., , , and . ISDA, page 539-545. IEEE, (2012)Intelligent wavelet domain watermarking of fingerprint images., , and . HIS, page 90-95. IEEE, (2012)Blind Quantitative Steganalysis using SVD Features., and . ICACCI, page 369-374. IEEE, (2018)