Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment., and . Wirel. Pers. Commun., 116 (4): 3039-3060 (2021)Dependency Driven Semantic Approach to Product Features Extraction and Summarization Using Customer Reviews., and . ACITY (3), volume 178 of Advances in Intelligent Systems and Computing, page 225-238. Springer, (2012)Machine Learning and Deep Learning Approaches to Analyze and Detect COVID-19: A Review., and . SN Comput. Sci., 2 (3): 226 (2021)Analysis and characterization of complex spatio-temporal patterns in nonlinear reaction-diffusion systems, , and . Physica A: Statistical and Theoretical Physics, 224 (1-2): 369--381 (Feb 1, 1996)Prediction of Phishing Websites Using AI Techniques., , , , , , and . Int. J. Inf. Secur. Priv., 16 (1): 1-14 (2022)A study on migrating non-users to retail internet banking: evidence from India., and . Int. J. Bus. Inf. Syst., 22 (3): 302-315 (2016)Geometry based triangulation of multiple trimmed NURBS surfaces., , , and . Comput. Aided Des., 33 (6): 439-454 (2001)Geodesic curve computations on surfaces., , , , and . Comput. Aided Geom. Des., 20 (2): 119-133 (2003)Computing offsets of trimmed NURBS surfaces., , and . Comput. Aided Des., 35 (5): 411-420 (2003)Computing non-self-intersecting offsets of NURBS surfaces., , and . Comput. Aided Des., 34 (3): 209-228 (2002)