Experimental studies of LSB watermarking with different noise RK Singh, DK Shaw, MJ Alam Procedia Computer Science 54, 612-620, 2015 | 45 | 2015 |
Level by level image compression-encryption algorithm based on quantum chaos map RK Singh, B Kumar, DK Shaw, DA Khan Journal of King Saud University-Computer and Information Sciences 33 (7 …, 2021 | 44 | 2021 |
A hybrid concept of cryptography and dual watermarking (LSB_DCT) for data security RK Singh, DK Shaw International Journal of Information Security and Privacy (IJISP) 12 (1), 1-12, 2018 | 17 | 2018 |
Comparative analysis of various edge detection techniques in biometric application S Kumar, M Singh, D Shaw International Journal of Engineering and Technology (IJET) 8 (6), 2452-2459, 2016 | 7 | 2016 |
Experimental analysis of impact of noise on various edge detection techniques RK Singh, D Shaw Proceedings of the World Congress on Engineering 1, 2016 | 5 | 2016 |
Optimal inventory policies of facilities in a supply chain system under fuzzy stochastic environment DK Shaw, DA Khan International Journal of Business Performance and Supply Chain Modelling 4 …, 2012 | 5 | 2012 |
A secured and robust image watermarking based on pixel permutation, wavelet transform and singular value decomposition RK Singh, DK Shaw Journal of Engineering Science and Technology 14 (4), 1924-1939, 2019 | 4 | 2019 |
Chaos based Encryption Mechanism for Wireless Local Area Network Authentication S Kumar, DK Shaw International Journal of Applied Engineering Research 10 (15), 35147-35152, 2015 | 4 | 2015 |
An integrated inventory model for single vendor multi customer scenario with multiple shipments in a supply chain DK Shaw, A Mishra, DA Khan International Journal of Management Science and Engineering Management 7 (2 …, 2012 | 3 | 2012 |
QUANTUM KEY DISTRIBUTION SCHEME: AN IMPROVEMENT BASED ON BB84 PROTOCOL. K Saha, SS Ghosh, DK Shaw International Journal of Advanced Research in Computer Science 9 (2), 2018 | 2 | 2018 |
An integrated inventory model for vendor-customer coordination in a supply chain DK Shaw, A Mishra, DA Khan International Journal of Business Performance and Supply Chain Modelling 3 …, 2011 | 2 | 2011 |
A BERT-encoded ensembled CNN model for suicide risk identification in social media posts J Gorai, DK Shaw Neural Computing and Applications 36 (18), 10955-10970, 2024 | 1 | 2024 |
DATA SECURITY ANALYSIS USING MACHINE LEARNING AND VISUALIZATION ON CYBER SECURITY S Kumar, DK Shaw Authorea Preprints, 2024 | | 2024 |
Two-phase feature extraction with chi square-based feature selection approach for the classification of online product reviews J Gorai, DK Shaw 2022 7th International Conference on Communication and Electronics Systems …, 2022 | | 2022 |
Study and Design of Integrated Vendor-Customer Models For Supply Chain System DK Shaw | | 2014 |
Replenishment policy for one vendor multi-customer scenario using hierarchical distribution model with backorder DK Shaw, A Mishra, DA Khan International Journal of Management Science and Engineering Management 8 (1 …, 2013 | | 2013 |
Irisbased Authentication Scheme in WLAN Using Logistic Map with MAC S Kumar, DK Shaw, S Paul | | |
A Multi-Criterion Heuristic Optimization for Demand Allocation and Transportation Problems using GA and AHP DK Shaw, DA Khan | | |