Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

e-Forensics steganography system for secret information retrieval., , , , and . Adv. Eng. Informatics, 19 (3): 235-241 (2005)Review of Current Guided Wave Ultrasonic Testing (GWUT) Limitations and Future Directions., , and . Sensors, 21 (3): 811 (2021)Predictive Modeling of Surface Wear in Mechanical Contacts under Lubricated and Non-Lubricated Conditions., , and . Sensors, 21 (4): 1160 (2021)Servers Voice Graphical Authentication., , , , , and . FSKD, page 2582-2586. IEEE, (2015)Robust and Imperceptible Watermarking of Video Streams for Low Power Devices., , , , and . FGIT-SIP, volume 61 of Communications in Computer and Information Science, page 177-184. Springer, (2009)A design structure matrix approach for measuring co-change-modularity of software products., , , and . MSR, page 331-335. ACM, (2018)Performance Analysis of Classifier Fusion Model with Minimum Feature Subset and Rotation of the Dataset., , and . FSKD (1), page 251-255. IEEE Computer Society, (2009)Optimized Selection Sort Algorithm for Two Dimensional array., , , , and . FSKD, page 2549-2553. IEEE, (2015)Ontology-Based Context Modeling in Physical Asset Integrity Management., , , and . Frontiers Comput. Sci., (2020)Non-Invasive Inspections: A Review on Methods and Tools., , and . Sensors, 21 (24): 8474 (2021)