Author of the publication

Cloud Storage For Privacy-Confidential Social Media Data Using Blockchain.

, , , , , and . IC3I, page 1459-1464. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quality Estimation of English-Hindi Outputs using Naive Bayes Classifier., , and . CoRR, (2013)Biometric iris recognition using radial basis function neural network., , , and . Soft Comput., 23 (22): 11801-11815 (2019)Algorithms for finding best locations of cluster heads for minimizing energy consumption in wireless sensor networks., , , and . Wireless Networks, 19 (7): 1755-1768 (2013)High-quality steganography scheme using hybrid edge detector and Vernam algorithm based on hybrid fuzzy neural network., and . Concurr. Comput. Pract. Exp., (2021)Hybrid model for classification of diseases using data mining and particle swarm optimisation techniques., , and . Int. J. Comput. Sci. Math., 17 (3): 295-307 (2023)Fog removal in images using improved dark channel prior and contrast limited adaptive histogram equalization., , , , and . Multim. Tools Appl., 78 (16): 23281-23307 (2019)Artificial intelligence methods for analysis of electrocardiogram signals for cardiac abnormalities: state-of-the-art and future challenges., and . Artif. Intell. Rev., 55 (2): 1519-1565 (2022)New scheme for underwater acoustically wireless transmission using direct sequence code division multiple access in MIMO systems., , , , and . Wirel. Networks, 25 (8): 4541-4553 (2019)Considering Documents in Lifelog Information Retrieval.. ICMR, page 497-500. ACM, (2018)Overview of NTCIR-13 Lifelog-2 Task., , , , , , and . NTCIR, National Institute of Informatics (NII), (2017)