Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online offensive behaviour in socialmedia: Detection approaches, comprehensive review and future directions., , , and . Entertain. Comput., (March 2023)CRUPA: collusion resistant user revocable public auditing of shared data in cloud., , , , , , , and . J. Cloud Comput., (2020)Reduction of jitter in 3D video by transmitting over multiple network paths., , , and . Int. J. Adv. Intell. Paradigms, 24 (1/2): 110-125 (2023)A self-adaptive migration model genetic algorithm for data mining applications., , and . Inf. Sci., 177 (20): 4295-4313 (2007)A heuristic for placement of limited range wavelength converters in all-optical networks., , and . Comput. Networks, 35 (2-3): 143-163 (2001)An Efficient Reconfigurable Architecture for Fingerprint Recognition., , and . VLSI Design, (2016)Heartbeat biometrics for human authentication., , , , , and . Signal Image Video Process., 5 (4): 485-493 (2011)Authentication using Finger Knuckle Prints., , , and . Signal Image Video Process., 7 (4): 633-645 (2013)An Efficient Framework for Prediction in Healthcare Data Using Soft Computing Techniques., , , , , and . ACC (3), volume 192 of Communications in Computer and Information Science, page 522-532. Springer, (2011)An Efficient Protocol to Study the Effect of Flooding on Energy Consumption in MANETS., , , , and . ACC (1), volume 190 of Communications in Computer and Information Science, page 141-152. Springer, (2011)