2022 Tenth International Conference on Advanced Cloud and Big Data (CBD)| 979-8-3503-0971-3/22/$31.00© 2022 IEEE| DOI: 10.1109/CBD58033. 2022.00064 TA Abduljabbar, Y AlZahrani, J Bao, K Bian, C Cao, S Cao, G Chen, ... | | |
A Cross Layer Design Approach for Multi-hop Mobile Ad Hoc Networks D Khan, P Ball, G Childs The Mediterranean Journal of Computers and Networks (MEDJCN) 3 (3), 91-99, 2007 | 3 | 2007 |
A dynamic programming approach to secure user image data in cloud based ERP systems S Mandal, DA Khan 2019 fifth international conference on image information processing (ICIIP …, 2019 | 4 | 2019 |
A formal analysis of Statistical Method to improving Software Quality Cost Control based on Weyuker’s Properties AK Marandi, DA Khan | | |
A Holistic Cross Layer Design Approach for Multi-Hop Mobile Ad Hoc Networks D Khan, P Ball, G Childs Proceedings of the Fifth International Symposium on Communication Systems …, 2006 | 2 | 2006 |
A JELS model under different demand rates in different cycles DA Khan, UC Ray, G Panda AMSE Periodicals 22 (3), 47, 2001 | | 2001 |
A JELS Probabilistic Inventory Model for One Vendor Multi Customers Situation with Random Demands having Weibull Distribution MS Mandal, DA Khan | | |
A JELS PROBABILISTIC INVENTORY MODEL FOR ONE VENDOR MULTI-CUSTOMERS SITUATION WITH RANDOM DEMANDS HAVING TRUNCATED NORMAL DISTRIBUTIONS DA KHAN Decision Making Systems in Business Administration, 353-371, 2013 | | 2013 |
A JELS probabilistic Inventory model with random demand having truncated normal distribution in a one vendor- one customer situation DA Khan, G Panda, UC Ray AMSE Modeling 28 (1), 2007 | | 2007 |
A JELS probabilistic Inventory model with random demand having uniform distribution in a one vendor and multi customer situation DA Khan AMSE Modeling Measurement & Control 30 (1), 2009 | | 2009 |
A JELS Stochastic inventory model with random demand G Panda, DA Khan, UC Ray Humboldt-Universität zu Berlin, Mathematisch-Naturwissenschaftliche Fakultät …, 2006 | 4 | 2006 |
A minesweeper game-based steganography scheme S Mahato, DK Yadav, DA Khan Journal of Information Security and Applications 32, 1-14, 2017 | 20 | 2017 |
A modified approach to data hiding in Microsoft Word documents by change-tracking technique S Mahato, DA Khan, DK Yadav Journal of King Saud University-Computer and Information Sciences 32 (2 …, 2020 | 37 | 2020 |
A modified approach to text steganography using HyperText markup language S Mahato, DK Yadav, DA Khan 2013 Third International Conference on Advanced Computing and Communication …, 2013 | 23 | 2013 |
A Multi-Vendor Single-Buyer Integrated Inventory Model with Shortages D Kumar, DA Khan, T Mandal International Journal of Management and Development Studies 6 (3), 5-16, 2017 | | 2017 |
A novel approach to automate test data generation for data flow testing based on hybrid adaptive PSO-GA algorithm S Kumar, DK Yadav, DA Khan International Journal of Advanced Intelligence Paradigms 9 (2-3), 278-312, 2017 | 24 | 2017 |
A NOVEL APPROACH TO TEXT STEGANOGRAPHY USING DEVANAGARI SCRIPT FEATURES S Mahato, DK Yadav, DA Khan | | |
A novel approach to text steganography using font size of invisible space characters in microsoft word document S Mahato, DK Yadav, DA Khan Intelligent Computing, Networking, and Informatics: Proceedings of the …, 2014 | 22 | 2014 |
A novel information hiding scheme based on social networking site viewers’ public comments S Mahato, DK Yadav, DA Khan Journal of Information Security and Applications 47, 275-283, 2019 | 11 | 2019 |
A rare case report on chronic osteomyelitis of fibula in a child of 6 years V Gupta, R Shah, A Pandey, D Khan, S Ayar Indian Journal of Orthopaedics 5 (4), 287-291, 2019 | 1 | 2019 |