Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web Recommendations Systems., , and . Springer, (2020)Bidirectional Growth based Mining and Cyclic Behaviour Analysis of Web Sequential Patterns, , , and . CoRR, (2013)Reduction of jitter in 3D video by transmitting over multiple network paths., , , and . Int. J. Adv. Intell. Paradigms, 24 (1/2): 110-125 (2023)Bimodal Biometric Verification Mechanism using fingerprint and face images(BBVMFF)., , and . ICIIS, page 372-377. IEEE, (2015)Statistical Analysis and Compression of DNA using Weighted Probability Approach and Modified Run-Length Encoding., , , and . IICAI, page 1058-1070. IICAI, (2007)A self-adaptive migration model genetic algorithm for data mining applications., , and . Inf. Sci., 177 (20): 4295-4313 (2007)Online offensive behaviour in socialmedia: Detection approaches, comprehensive review and future directions., , , and . Entertain. Comput., (March 2023)CRUPA: collusion resistant user revocable public auditing of shared data in cloud., , , , , , , and . J. Cloud Comput., (2020)Cross Layer Design for Wi-Fi Sensor Network Handling Static and Dynamic Environment Using Local Automate Based Autonomic Network Architecture., , and . SN Comput. Sci., 2 (3): 232 (2021)Minimal Block Knight's Tour and Edge with LSB Pixel Replacement Based Encrypted Image Steganography., , and . SN Comput. Sci., 2 (3): 139 (May 2021)