Author of the publication

Securing the Supply Chain: A Comprehensive Solution with Blockchain Technology and QR-Based Anti-Counterfeit Mechanism.

, , , and . Int. J. Perform. Eng., 19 (5): 312 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Tweet Classification Model Based on Dynamic and Static Component Topic Vectors., , and . Australasian Conference on Artificial Intelligence, volume 9457 of Lecture Notes in Computer Science, page 424-430. Springer, (2015)Towards a Discourse Level Coherence Structure., and . ICAART (1), page 11-19. INSTICC Press, (2010)An Improved Selective Facial Extraction Model for Age Estimation., , , and . IVCNZ, page 1-6. IEEE, (2019)Path Following of Autonomous Agents Under the Effect of Noise., , , and . ICSI (2), volume 10942 of Lecture Notes in Computer Science, page 3-14. Springer, (2018)"How Bullying is this Message?": A Psychometric Thermometer for Bullying., , and . COLING, page 695-706. ACL, (2016)A Multi-Strategy Approach for Location Mining in Tweets: AUT NLP Group Entry for ALTA-2014 Shared Task., , , and . ALTA, page 163-170. ACL, (2014)Tracking Based Secure AODV Routing Protocol., , and . BAIP, volume 70 of Communications in Computer and Information Science, page 175-180. Springer, (2010)An Add-on to Present Banking: m-banking., , , and . SocProS (2), volume 336 of Advances in Intelligent Systems and Computing, page 373-384. Springer, (2014)The Role of Linked Data in Content Selection., and . PRICAI, volume 8862 of Lecture Notes in Computer Science, page 573-586. Springer, (2014)An Ensemble Architecture for Linked Data Lexicalization., and . CICLing (1), volume 10761 of Lecture Notes in Computer Science, page 435-449. Springer, (2017)