Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information retrieval by document re-ranking using term association graph, and . page 21:1--21:8. ACM, (2014)Design of trust identification system for cloud services., and . Int. J. Ad Hoc Ubiquitous Comput., 37 (4): 218-226 (2021)Combining User Interested Topic and Document Topic for Personalized Information Retrieval., and . BDA, volume 8883 of Lecture Notes in Computer Science, page 60-79. Springer, (2014)Secure Image Communication Through Adaptive Deer Hunting Optimization Based Vector Quantization Coding of Perceptually Encrypted Images., and . Wirel. Pers. Commun., 116 (3): 2239-2260 (2021)Dynamic remote host classification in grid computing using Clonalg., , and . ICWET, page 198-201. ACM, (2010)An efficient implementation of elliptic curve over finite fields., and . ICWET, page 451-453. ACM, (2010)Circumvention of Nascent and Potential Wi-Fi Phishing Threat Using Association Rule Mining., , and . Wireless Personal Communications, 94 (4): 2331-2361 (2017)A study of elliptic curve cryptography and its application., and . ICWET, page 425-427. ACM, (2010)Deep learning based big medical data analytic model for diabetes complication prediction., and . J. Ambient Intell. Humaniz. Comput., 11 (11): 5691-5702 (2020)Modified adaptive neuro-fuzzy inference system (M-ANFIS) based multi-disease analysis of healthcare Big Data., and . J. Supercomput., 76 (11): 8657-8678 (2020)