Author of the publication

Two-stage classification approach for the recognition of handwritten atomic Odia character.

, , and . IJAPR, 4 (1): 44-63 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks, and . ACEEE International Journal on Network Security, 3 (1): 4 (January 2012)Sarcastic Sentiment Detection Based on Types of Sarcasm Occurring in Twitter Data., , , and . Int. J. Semantic Web Inf. Syst., 13 (4): 89-108 (2017)Approximation Algorithms for Optimizing Privacy and Utility., , , and . CSA, page 1-6. IEEE, (2009)Deceptive review detection using labeled and unlabeled data., , , and . Multim. Tools Appl., 76 (3): 3187-3211 (2017)Achieving k-anonymity Using Improved Greedy Heuristics for Very Large Relational Databases., , , , and . Trans. Data Priv., 6 (1): 1-17 (2013)A Genetic Algorithm Based Dynamic Load Balancing Scheme for Heterogeneous Distributed Systems., , and . PDPTA, page 499-505. CSREA Press, (2008)Harnessing Online News for Sarcasm Detection in Hindi Tweets., , and . PReMI, volume 10597 of Lecture Notes in Computer Science, page 679-686. Springer, (2017)Data Dissemination Protocol for Mobile Sink in Wireless Sensor Networks., and . J. Comput. Eng., (2014)Two-stage classification approach for the recognition of handwritten atomic Odia character., , and . IJAPR, 4 (1): 44-63 (2017)On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature., , , and . IC3, volume 40 of Communications in Computer and Information Science, page 182-193. Springer, (2009)