Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification of Sensitive Items in Privacy Preserving - Association Rule Mining., and . Computer and Information Science, 1 (2): 85-89 (2008)Background Modelling using a Q-Tree Based Foreground Segmentation., and . Scalable Comput. Pract. Exp., 21 (1): 17-31 (2020)Sensitive Items in Privacy Preserving - Association Rule Mining., and . J. Inf. Knowl. Manag., 7 (1): 31-35 (2008)PeRView: A Framework for Personalized Review Selection Using Micro-Reviews., , , , and . CoRR, (2018)A New Approach to Sensitive Rule Hiding., , and . Computer and Information Science, 1 (3): 107-111 (2008)Personalize Review Selection Using PeRView., , , , and . KSEM (1), volume 11061 of Lecture Notes in Computer Science, page 238-249. Springer, (2018)Multiple Criteria Decision Analysis Based Overlapped Latent Fingerprint Recognition System Using fuzzy Sets., , and . Int. J. Fuzzy Syst., 20 (6): 2016-2042 (2018)Implementation of biometrics based security system with integrated techniques., , and . CCSEIT, page 37-42. ACM, (2012)Neural network based automatic fingerprint recognition system for overlapped latent images., , and . J. Intell. Fuzzy Syst., 28 (6): 2889-2899 (2015)Intelligent Tutoring System: Predicting Students Results Using Neural Networks., , and . J. Convergence Inf. Technol., 3 (3): 22-26 (2008)