Author of the publication

Urdu Handwritten Characters Data Visualization and Recognition Using Distributed Stochastic Neighborhood Embedding and Deep Network.

, , , , , , , , , and . Complex., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hybrid approach for preventing Black and Gray hole attacks in MANET., and . ICDIM, page 55-57. IEEE, (2013)A Lightweight Identity-Based Signature Scheme for Mitigation of Content Poisoning Attack in Named Data Networking With Internet of Things., , , , , , , and . IEEE Access, (2020)Enhancement of the Capability Maturity Model for Improving the Quality of Software Projects in Developing Countries., , , , , and . Sci. Program., (2021)An Empirical Investigation of the Challenges of Cloud-Based ERP Adoption in Pakistani SMEs., , , , , , and . Sci. Program., (2021)Preventing black and gray hole attacks in AODV using optimal path routing and hash., , , and . ICNSC, page 645-648. IEEE, (2013)An Efficient and Secure Multimessage and Multireceiver Signcryption Scheme for Edge-Enabled Internet of Vehicles., , , , , , , and . IEEE Internet Things J., 9 (4): 2688-2697 (2022)Urdu Handwritten Characters Data Visualization and Recognition Using Distributed Stochastic Neighborhood Embedding and Deep Network., , , , , , , , , and . Complex., (2021)Spatiotemporal Analysis of Residents in Shanghai by Utilizing Chinese Microblog Weibo Data., , , , and . Mob. Inf. Syst., (2021)Lightweight and provable secure cross-domain access control scheme for internet of things (IoT) based wireless body area networks (WBAN)., , , , and . Microprocess. Microsystems, (2021)A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)., , , , , and . J. Inf. Secur. Appl., (2021)