Author of the publication

GenIt-e-MoTo: Generation of intelligence to envisage modus operandi of terror outfits.

, , , and . ICIS, page 1-6. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Rough Set Based Clustering Approach for Streaming Data., and . SocProS, volume 236 of Advances in Intelligent Systems and Computing, page 1253-1265. Springer, (2012)Unsupervised outlier detection in streaming data using weighted clustering., and . ISDA, page 947-952. IEEE, (2012)Species identification based on approximate matching., , and . Bangalore Compute Conf., page 30. ACM, (2011)Data Decomposition Based Learning for Load Time-Series Forecasting., and . PKDD/ECML Workshops, volume 1323 of Communications in Computer and Information Science, page 62-74. Springer, (2020)Privacy Preserving Sequential Pattern Mining in Progressive Databases Using Noisy Data., , and . IV, page 456-460. IEEE Computer Society, (2009)Efficient Mining of Frequent Items Coupled with Weight and /or Support over Progressive Databases., , and . ICDEM, volume 6411 of Lecture Notes in Computer Science, page 309-316. Springer, (2010)VIDPSO: Victim item deletion based PSO inspired sensitive pattern hiding algorithm for dense datasets., and . Inf. Process. Manag., 57 (5): 102255 (2020)Using Moments for Feature Extraction from Time Series Data.. SEDE, page 109-114. ISCA, (2008)Closed Itemset based Sensitive Pattern Hiding for Improved Data Utility and Scalability., , and . IEEE BigData, page 4026-4035. IEEE, (2020)Analyzing civic complaints for proactive maintenance in smart city., and . ICIS, page 1-6. IEEE Computer Society, (2016)