关注
Danish Ali Khan
标题
引用次数
年份
2022 Tenth International Conference on Advanced Cloud and Big Data (CBD)| 979-8-3503-0971-3/22/$31.00© 2022 IEEE| DOI: 10.1109/CBD58033. 2022.00064
TA Abduljabbar, Y AlZahrani, J Bao, K Bian, C Cao, S Cao, G Chen, ...
A Cross Layer Design Approach for Multi-hop Mobile Ad Hoc Networks
D Khan, P Ball, G Childs
The Mediterranean Journal of Computers and Networks (MEDJCN) 3 (3), 91-99, 2007
32007
A dynamic programming approach to secure user image data in cloud based ERP systems
S Mandal, DA Khan
2019 fifth international conference on image information processing (ICIIP …, 2019
42019
A formal analysis of Statistical Method to improving Software Quality Cost Control based on Weyuker’s Properties
AK Marandi, DA Khan
A Holistic Cross Layer Design Approach for Multi-Hop Mobile Ad Hoc Networks
D Khan, P Ball, G Childs
Proceedings of the Fifth International Symposium on Communication Systems …, 2006
22006
A JELS model under different demand rates in different cycles
DA Khan, UC Ray, G Panda
AMSE Periodicals 22 (3), 47, 2001
2001
A JELS Probabilistic Inventory Model for One Vendor Multi Customers Situation with Random Demands having Weibull Distribution
MS Mandal, DA Khan
A JELS PROBABILISTIC INVENTORY MODEL FOR ONE VENDOR MULTI-CUSTOMERS SITUATION WITH RANDOM DEMANDS HAVING TRUNCATED NORMAL DISTRIBUTIONS
DA KHAN
Decision Making Systems in Business Administration, 353-371, 2013
2013
A JELS probabilistic Inventory model with random demand having truncated normal distribution in a one vendor- one customer situation
DA Khan, G Panda, UC Ray
AMSE Modeling 28 (1), 2007
2007
A JELS probabilistic Inventory model with random demand having uniform distribution in a one vendor and multi customer situation
DA Khan
AMSE Modeling Measurement & Control 30 (1), 2009
2009
A JELS Stochastic inventory model with random demand
G Panda, DA Khan, UC Ray
Humboldt-Universität zu Berlin, Mathematisch-Naturwissenschaftliche Fakultät …, 2006
42006
A minesweeper game-based steganography scheme
S Mahato, DK Yadav, DA Khan
Journal of Information Security and Applications 32, 1-14, 2017
202017
A modified approach to data hiding in Microsoft Word documents by change-tracking technique
S Mahato, DA Khan, DK Yadav
Journal of King Saud University-Computer and Information Sciences 32 (2 …, 2020
372020
A modified approach to text steganography using HyperText markup language
S Mahato, DK Yadav, DA Khan
2013 Third International Conference on Advanced Computing and Communication …, 2013
232013
A Multi-Vendor Single-Buyer Integrated Inventory Model with Shortages
D Kumar, DA Khan, T Mandal
International Journal of Management and Development Studies 6 (3), 5-16, 2017
2017
A novel approach to automate test data generation for data flow testing based on hybrid adaptive PSO-GA algorithm
S Kumar, DK Yadav, DA Khan
International Journal of Advanced Intelligence Paradigms 9 (2-3), 278-312, 2017
242017
A NOVEL APPROACH TO TEXT STEGANOGRAPHY USING DEVANAGARI SCRIPT FEATURES
S Mahato, DK Yadav, DA Khan
A novel approach to text steganography using font size of invisible space characters in microsoft word document
S Mahato, DK Yadav, DA Khan
Intelligent Computing, Networking, and Informatics: Proceedings of the …, 2014
222014
A novel information hiding scheme based on social networking site viewers’ public comments
S Mahato, DK Yadav, DA Khan
Journal of Information Security and Applications 47, 275-283, 2019
112019
A rare case report on chronic osteomyelitis of fibula in a child of 6 years
V Gupta, R Shah, A Pandey, D Khan, S Ayar
Indian Journal of Orthopaedics 5 (4), 287-291, 2019
12019
系统目前无法执行此操作,请稍后再试。
文章 1–20