Autor der Publikation

Proposing a reliable method of securing and verifying the credentials of graduates through blockchain.

, , , , , und . EURASIP J. Inf. Secur., 2021 (1): 7 (2021)

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

 

Weitere Publikationen von Autoren mit dem selben Namen

An Approach for Summarizing Hindi Text Through a Hybrid Fuzzy Neural Network Algorithm., , und . J. Inf. Knowl. Manag., (2014)Image Denoising Using Novel Social Grouping Optimization Algorithm with Transform Domain Technique., , , , und . Int. J. Nat. Comput. Res., 8 (4): 28-40 (2019)Gender Based Emotion Recognition System for Telugu Rural Dialects Using Hidden Markov Models, , , und . CoRR, (2010)Proposing a reliable method of securing and verifying the credentials of graduates through blockchain., , , , , und . EURASIP J. Inf. Secur., 2021 (1): 7 (2021)Evolutionary Image Thresholding for Image Segmentation., und . IJCVIP, 9 (1): 17-34 (2019)Batch incremental processing for FP-tree construction using FP-Growth algorithm., , und . Knowl. Inf. Syst., 33 (2): 475-490 (2012)Design of Fixed and Ladder Mutation Factor-Based Clonal Selection Algorithm for Solving Unimodal and Multimodal Functions., , , , , und . Applied Comp. Int. Soft Computing, (2011)Disaster tweet classification: A majority voting approach using machine learning algorithms., , und . Intell. Decis. Technol., 17 (2): 343-355 (2023)An Experimental Study with Tensor Flow for Characteristic mining of Mathematical Formulae from a Document., , und . EAI Endorsed Trans. Scalable Inf. Syst., 6 (21): e6 (2019)Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks., und . Netw. Protoc. Algorithms, 3 (4): 122-140 (2011)