displayNone
Banner

Publications

Books Chapters

  • Nabin Kumar Sahu and C. Nahak Semi-inner Product: Application to Frame Theory and Numerical Range of Operators in Mathematics and Computing 2013, Ram N. Mohapatra, [et al.], ed. New Delhi, Springer pp 77-90. Doi: 10.1007/978-81-322-1952-1_6
  • Naveen Kumar and Anish Mathuria Security and Privacy Issues in Outsourced Personal Health Record in Research advances in Cloud Computing, Sanjay Chaudhary, Gaurav Somani, Rajkumar Buyya, (eds), Singapore: Springer, pp. 431-447. doi: 10.1007/978-981-10-5026-8_17
  • H. Gajera, Hemant A. Patil and Tanvina B. Patel Analysis of normal and pathological voices by novel chaotic titration method in Signal and Acoustic Modelling for Speech and Communication Disorders, Hemant A. Patil, Amy Neustein, and Manisha Kulshetra, (eds), Berlin: De Gruyter, pp. 87-120. doi: 10.1515/9781501502415
  • Girish Kumar Mekala, Rajeevan Chandel and Ashwani Kumar, Yash Agrawal Performance Analysis of Mixed-Wall CNT Interconnects Using Colliding Bodies Optimization Technique in Major Applications of Carbon Nanotube Field-Effect Transistors (CNTFET), Balwinder Raj, Mamta Khosla and Amandeep Singh, (eds), USA: IGI Global pp. 189-211 doi: 10.4018/978-1-7998-1393-4.ch009.
  • Siva Charan Muraharirao and Manik Lal Das Securing Digital Image with Authentication Code in Computer Vision and Image Processing in Intelligent Systems and Multimedia Technologies, Muhammad Sarfraz, (ed), Pennsylvania, USA: IGI Global pp. 203-215. Doi:10.4018/978-1-4666-6030-4.ch011
  • Jajodia S, Sahasrabudhe S.C. Message from the general chairs Information Systems Security, Lecture Notes in Computer Science 6503, by Somesh Jha, Anish Mathuria (Eds.) Springer-Verlag, Berlin, Heidelberg, Dec. 2010, pp. VI 9783642177149 10.1007/978-3-642-17714-9
  • Manik Lal Das Privacy and Accountability Concerns in the Age of Big Data in Big Data: Storage, Sharing, and Security, Fei Hu (ed), CRC Press, pp. 341-356. DOI: 10.1201/b19694-17
  • Jha S., Anish Mathuria Message from the technical program chairs Information Systems Security, Lecture Notes in Computer Science 6503, by Somesh Jha, Anish Mathuria (Eds.) Springer-Verlag, Berlin, Heidelberg, Dec. 2010, pp. VII 9783642177149 10.1007/978-3-642-17714-9
  • Mehul S., Raval Blind steganalysis using machine intelligence in Computational Techniques and Algorithms for Image Processing, S. Ramakrishnan and Ibrahiem M. M. El Emary Ed. Saarbr cken: Lambert Academic Publishing (LAP),
  • Hemant A, Patil Cry baby's using spectrographic analysis to assess neonatal health status from an infant?s cry in Advances in Speech Recognition: Mobile Environments, Call Centers and Clinics, Amy Neustein Ed. Berlin: Springer
Back to Top