Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An empirical evaluation of cross project priority prediction., , and . Int. J. Syst. Assur. Eng. Manag., 5 (4): 651-663 (2014)Using PSO in a spatial domain based image hiding scheme with distortion tolerance., , and . Comput. Electr. Eng., 39 (2): 640-654 (2013)Predicting the priority of a reported bug using machine learning techniques and cross project validation., , , and . ISDA, page 539-545. IEEE, (2012)A Self-organizing Self-healing On-demand Loop-free Path Routing Protocol Using Mobile Process Groups for Mobile Ad-hoc Networks., and . ARTCom, page 396-400. IEEE Computer Society, (2009)Avoiding Threats Using Multi Agent System Planning for Web Based Systems., , , , and . ICCCI, volume 5796 of Lecture Notes in Computer Science, page 709-719. Springer, (2009)Blind Quantitative Steganalysis using SVD Features., and . ICACCI, page 369-374. IEEE, (2018)Intelligent wavelet domain watermarking of fingerprint images., , and . HIS, page 90-95. IEEE, (2012)Steganography using Cuckoo Optimized Wavelet Coefficients., and . WCI, page 365-370. ACM, (2015)Securing fingerprint images using a hybrid technique., , and . ICACCI, page 557-565. ACM, (2012)MARST: Multi-Agent Recommender System for e-Tourism Using Reputation Based Collaborative Filtering., , , and . DNIS, volume 8381 of Lecture Notes in Computer Science, page 189-201. Springer, (2014)