Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trusted and secure clustering in mobile pervasive environment., and . Hum. centric Comput. Inf. Sci., (2015)A Bio-inspired Trusted Clustering for Mobile Pervasive Environment., and . SocProS (2), volume 259 of Advances in Intelligent Systems and Computing, page 553-564. Springer, (2013)Mining Frequent Itemset Using Quine-McCluskey Algorithm., , , , and . SocProS (2), volume 437 of Advances in Intelligent Systems and Computing, page 763-769. Springer, (2015)A Better Approach for Multilevel Association Rule Mining., , , , and . SocProS (2), volume 437 of Advances in Intelligent Systems and Computing, page 597-604. Springer, (2015)Classification Technique for Improving User Access on Web Log Data., , , and . ICACNI, volume 243 of Advances in Intelligent Systems and Computing, page 1089-1097. Springer, (2013)An efficient approach for storage of court judgements using graph database., , and . Int. J. Adv. Intell. Paradigms, 22 (1/2): 214-228 (2022)Automatic and multimodal nuisance activity detection inside ATM cabins in real time., , , , and . Multim. Tools Appl., 82 (4): 5113-5132 (February 2023)Deep Graph-Long Short-Term Memory: A Deep Learning Based Approach for Text Classification., , and . Wirel. Pers. Commun., 119 (3): 2287-2301 (2021)Multiclass Classification of Disease Using CNN and SVM of Medical Imaging., , , and . ICACDS (2), volume 1614 of Communications in Computer and Information Science, page 88-99. Springer, (2022)An approach to solve the target coverage problem by efficient deployment and scheduling of sensor nodes in WSN., and . Int. J. Syst. Assur. Eng. Manag., 8 (2): 493-514 (2017)