关注
Parvinder Singh
Parvinder Singh
在 dcrustm.org 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Investigating brain tumor segmentation and detection techniques
M Lather, P Singh
Procedia Computer Science 167, 121-130, 2020
662020
An effective implementation of security based algorithmic approach in mobile adhoc networks
PSMD Rajinder Singh
Human-centric Computing and Information Sciences 4 (7), 2014
572014
A systematic literature mapping on secure identity management using blockchain technology
T Rathee, P Singh
Journal of King Saud University-Computer and Information Sciences 34 (8 …, 2022
542022
Fraud detection by monitoring customer behavior and activities
P Singh, M Singh
International Journal of computer applications 111 (11), 2015
512015
Energy-efficient QoS-aware intelligent hybrid clustered routing protocol for wireless sensor networks
P Singh, R Singh
Journal of Sensors 2019, 1-12, 2019
322019
Evaluating the performance of message hidden in 1 st and 2 nd bit plane.
P Singh, S Batra, HR Sharma
WSEAS Transactions on Information Science and Applications 2 (8), 1220-1227, 2005
262005
A Review: QR Codes and its Image Pre-Processing Method
PS Anjali Singh
International Journal of Science, Engineering and Technology Research 5 (6), 2016
252016
Brain Tumor Detection through MR Images: A Review of Literature
PS Ritu Rana
IOSR Journal of Computer Engineering, 17 (5), 07-18, 2015
202015
Brain Tumor Detection through MR Images: A Review of Literature
PS Ritu Rana
IOSR Journal of Computer Engineering 17 (5), 7-18, 2015
202015
An enhanced data hiding approach using pixel mapping method with optimal substitution approach
PK Panjabi, P Singh
International Journal of Computer Applications 74 (10), 36-43, 2013
162013
An Enhanced Data Hiding Approach Using Pixel Mapping Methos with Optimal Substitution Approach,
PS Prince Kumar
International Journal of Computer Applications 74 (10), 36-43, 2013
16*2013
A Comprehensive Survey of Video Encryption Algorithms
PS Darshana
International Journal of Computer Applications 59 (1), 14-19, 2012
14*2012
A comprehensive survey of video encryption algorithms
D Hooda, P Singh
International Journal of Computer Applications 59 (1), 2012
142012
MAC Protocols in Wireless Sensor Network: A Survey.
PS Anuradha Rai, Suman Deswal
International Journal of New Innovation in Engineering and Technology 5 (1 …, 2016
122016
Performance Modelling of Information Retrieval Techniques Using Similarity Functions in Wide Area Networks
YC Jasvinder Singh, Parvinder Singh
International Journal of Advanced Research in Computer Science and Software …, 2014
122014
Reduction of noise from speech signal using HAAR and biorthogonal wavelet
P Singh, D Singh, D Sethi
IJECT 2 (3), 2011
112011
Uivh-algorithm for seamless mobility in heterogeneous wireless network
S Sangwan, P Singh, RB Patel
Proceedings of the CUBE international information technology conference, 210-215, 2012
102012
A self-sovereign identity management system using blockchain
T Rathee, P Singh
Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021, 371-379, 2022
92022
Secure data sharing using Merkle hash digest based blockchain identity management
T Rathee, P Singh
Peer-to-Peer Networking and Applications 14, 3851-3864, 2021
92021
Enhancing LZW Algorithm to Increase Overall Performance
P Singh, M Duhan
2006 Annual IEEE India Conference, 1-4, 2006
92006
系统目前无法执行此操作,请稍后再试。
文章 1–20