Author of the publication

Forgery document detection in information management system using cognitive techniques.

, and . J. Intell. Fuzzy Syst., 39 (6): 8057-8068 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Acoustic Modeling using Vector Quantization in Kernel Feature Space and Classification using String Kernel based Support Vector Machines., and . IJCNN, page 1512-1517. IEEE, (2007)CEVAB: NIR-VIS face recognition using convolutional encoder-based visual attention block., , and . Int. J. Data Anal. Tech. Strateg., 16 (3): 262-281 (2024)Watermark Detection in Spatial and Transform Domains Based on Tree Structured Wavelet Transform., and . SSCC, volume 467 of Communications in Computer and Information Science, page 230-238. Springer, (2014)Detection of StegoBot: a covert social network botnet., , and . SECURIT, page 36-41. ACM, (2012)Metadata Attribute Based Cipher-Key Generation System in Cloud., and . SNDS, volume 420 of Communications in Computer and Information Science, page 275-287. Springer, (2014)Trusted cloud broker for estimating the reputation of cloud providers in federated cloud environment., and . Concurr. Comput. Pract. Exp., (2022)Compensation Based Grid Scheduling., and . ICIT, page 89-93. IEEE Computer Society, (2006)FEBSRA: Fuzzy Trust Based Energy Aware Balanced Secure Routing Algorithm for Secured Communications in WSNs., , , , and . Wirel. Pers. Commun., 125 (1): 63-86 (2022)Forgery document detection in information management system using cognitive techniques., and . J. Intell. Fuzzy Syst., 39 (6): 8057-8068 (2020)A Novel Node Splitting Criteria for Decision Trees Based on Theil Index., and . ICONIP (2), volume 7664 of Lecture Notes in Computer Science, page 435-443. Springer, (2012)