Kumar, D. S., Kumar, K., Raja, K., Chhotaray, R., & Pattnaik, S. (2010). Hybrid fingerprint matching using block filter and strength factors. https://doi.org/10.1109/ICCEA.2010.98
CSE
Wang, G.-G., Deb, S., Gandomi, A., & Alavi, A. (2016). Opposition-based krill herd algorithm with Cauchy mutation and position clamping. Neurocomputing, 177, 147-157,. https://doi.org/10.1016/j.neucom.2015.11.018
Panda, S., Rajappa, V., & Biradar, A. (2008). Genetic algorithm based secure authentication protocol with dual central server and token authentication in large scale mobile Ad-Hoc networks. https://doi.org/10.1109/GLOCOM.2008.ECP.1061
Dalali, S., & Suresh, L. (2016). Daubechives Wavelet Based Face Recognition Using Modified LBP. Elsevier B.V. https://doi.org/10.1016/j.procs.2016.07.219
Suresh, L., & Simha, J. (2008). Novel and efficient clustering algorithm using structured query language. https://doi.org/10.1109/ICCCNET.2008.4787767
Shashikumar, D., Raja, K., Chhotaray, R., & Pattanaik, S. (2010). Biometric Security System Based on Signature Verification Using Neural Networks. https://doi.org/10.1109/ICCIC.2010.5705734
Shalini, S., Naikodi, C., & Suresh, L. (2015). Path oriented randomly-generated keys for uncompromising security in MANETs. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ICACCS.2015.7324084
Suresh, L., Simha, J., & Velur, R. (2009). Analysis and prediction server with column store database - A case study in telecom churn. https://doi.org/10.1109/TENCON.2009.5395982
Bhat, P., & Reddy, K. (2015). Energy efficient detection of malicious nodes using secure clustering with load balance and reliable node disjoint multipath routing in Wireless Sensor Networks. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ICACCI.2015.7275734
Kumar, D. S., Kumar, R., Raja, K., Chhotaray, R., & Pattanaik, S. (2010). Combined Off-Line Signature Verification Using Neural Networks. https://doi.org/10.1007/978-3-642-15766-0_99
