Author of the publication

Palmprint Authentication Using Pattern Classification Techniques.

, , , and . SEMCCO (1), volume 7076 of Lecture Notes in Computer Science, page 417-424. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introducing HL7 FHIR Genomics Operations: a developer-friendly approach to genomics-EHR integration., , , , , , , , , and 10 other author(s). J. Am. Medical Informatics Assoc., 30 (3): 485-493 (February 2023)Optical Script Identification for multi-lingual Indic-script., and . CoRR, (2023)H.264 Coarse Grain Scalable (CGS) and Medium Grain Scalable (MGS) Encoded Video: A Trace Based Traffic and Quality Evaluation., , , , and . IEEE Trans. Broadcast., 58 (3): 428-439 (2012)LBP-Haar Cascade Based Real-Time Pedestrian Protection System Using Raspberry Pi., and . RTIP2R (1), volume 1035 of Communications in Computer and Information Science, page 60-73. Springer, (2018)Significance of Adaptive Sensing for Smart Building Monitoring: A Practical Study., , and . COMSNETS, page 684-689. IEEE, (2019)MCL@IITK at SemEval-2021 Task 2: Multilingual and Cross-lingual Word-in-Context Disambiguation using Augmented Data, Signals, and Transformers., , , and . SemEval@ACL/IJCNLP, page 511-520. Association for Computational Linguistics, (2021)IoT-driven augmented reality and virtual reality systems in neurological sciences., , , and . Internet Things, (April 2024)Face Authentication Using Supervised Learning Techniques., , , , and . SEMCCO, volume 7677 of Lecture Notes in Computer Science, page 738-745. Springer, (2012)Palmprint Authentication Using Pattern Classification Techniques., , , and . SEMCCO (1), volume 7076 of Lecture Notes in Computer Science, page 417-424. Springer, (2011)GAER: genetic algorithm-based energy-efficient routing protocol for infrastructure-less opportunistic networks., , , , and . J. Supercomput., 69 (3): 1183-1214 (2014)