Author of the publication

Insights and reflections using data analytics approach of COVID-19 situation among the Indian states and ethical considerations.

, , , , and . Int. J. Syst. Assur. Eng. Manag., 13 (1): 131-142 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unsupervised Learning-based Approach for Contextual Understanding of Web Material Around a New Domain of Algorithmic Government., and . Digit. Gov. Res. Pract., 5 (1): 2:1-2:20 (March 2024)Machine Learning Models for Government to Predict COVID-19 Outbreak., , , and . Digit. Gov. Res. Pract., 1 (4): 26:1-26:6 (2020)Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization., , and . SEMCCO, volume 6466 of Lecture Notes in Computer Science, page 230-237. Springer, (2010)ICT Integrated Social Media Framework for consumer awareness in society using ICT tools., and . ICIS, page 229-233. IEEE Computer Society, (2014)Insights and reflections using data analytics approach of COVID-19 situation among the Indian states and ethical considerations., , , , and . Int. J. Syst. Assur. Eng. Manag., 13 (1): 131-142 (2022)Using Chaos in Grey Wolf Optimizer and Application to Prime Factorization., and . SocProS (1), volume 816 of Advances in Intelligent Systems and Computing, page 25-43. Springer, (2017)Fast, Reliable & Secure Digital Communication Using Hadamard Matrices.. ICCTA, page 526-532. IEEE Computer Society, (2007)Improving Cryptography Based On Entropoids., and . IACR Cryptol. ePrint Arch., (2021)Machine Learning-Based Method and Its Performance Analysis for Occupancy Detection in Indoor Environment., , , and . SIRS, volume 678 of Advances in Intelligent Systems and Computing, page 240-251. Springer, (2017)New Lightweight Conditional Encryption Schemes for Multimedia., , and . SocProS (1), volume 258 of Advances in Intelligent Systems and Computing, page 365-377. Springer, (2013)