Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting Sensitive Warehouse Data through UML based Modeling., , and . ICIA, page 31:1-31:6. ACM, (2016)Comparative analysis of CN2 rule induction with other classification algorithms for network security., and . Multim. Tools Appl., 81 (26): 37119-37135 (2022)Significant Enhancement of Object Recognition Efficiency Using Human Cognition based Decision Clustering., and . Int. J. Comput. Vis. Image Process., 3 (4): 1-15 (2013)Dynamic Model on DDoS Attack in Computer Network., and . ICIA, page 11:1-11:5. ACM, (2016)Segmentation of Ill-Defined Objects by Convoluting Context Window of Each Pixel with a Non-Parametric Function., and . Int. J. Comput. Vis. Image Process., 3 (1): 33-41 (2013)Diverse Analysis of Data Mining and Machine Learning Algorithms to Secure Computer Network., and . Wirel. Pers. Commun., 124 (2): 1033-1059 (2022)Artificial intelligence for classification and regression tree based feature selection method for network intrusion detection system in various telecommunication technologies., and . Comput. Intell., (February 2024)Inducing Personalities and Values from Language Use in Social Network Communities., , , , , and . Inf. Syst. Frontiers, 20 (6): 1219-1240 (2018)Ä pessimist sees the difficulty in every opportunity; an optimist sees the opportunity in every difficulty" - Understanding the psycho-sociological influences to it., , , and . ICON, page 255-264. NLP Association of India, (2017)Modeling Satire in English Text for Automatic Detection., , , , and . ICDM Workshops, page 970-977. IEEE Computer Society, (2016)