Author of the publication

Textual analysis of traitor-based dataset through semi supervised machine learning.

, , , , and . Future Gener. Comput. Syst., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Semi-Automated Dynamic Approach to Threat Evaluation and Optimal Defensive Resource Allocation., , , and . ICIC (1), volume 5754 of Lecture Notes in Computer Science, page 8-17. Springer, (2009)Capturing outlines of planar images using Bézier cubics., and . Comput. Graph., 31 (5): 719-729 (2007)Object Coding for Real Time Image Processing Applications., and . ICAPR (2), volume 3687 of Lecture Notes in Computer Science, page 550-559. Springer, (2005)Blockchain-Based Public Key Infrastructure: A Transparent Digital Certification Mechanism for Secure Communication., , , and . IEEE Netw., 35 (5): 220-225 (2021)A Novel Corner Detector Approach using Sliding Rectangles., and . AICCSA, page 621-626. IEEE Computer Society, (2006)An Optimal Dynamic Threat Evaluation and Weapon Scheduling Technique., and . SGAI Conf., page 437-450. Springer, (2009)A novel approach to polygonal approximation of digital curves., and . J. Vis. Commun. Image Represent., 18 (3): 264-274 (2007)Fingerprint Enhancement and Reconstruction., and . ICIC (2), volume 5755 of Lecture Notes in Computer Science, page 660-669. Springer, (2009)Role of Corner Detection in Capturing Shape Outlines., and . JCIS, Atlantis Press, (2006)Handling Insider Threat Through Supervised Machine Learning Techniques., , , and . EUSPN/ICTH, volume 177 of Procedia Computer Science, page 64-71. Elsevier, (2020)