• Publications
  • Influence
Analysis and Ranking of Software Reliability Models Based on Weighted Criteria Value
TLDR
A computational methodology based on weighted criteria is presented to the problem of performance analysis of various non-homogenous Poisson process (NHPP) models. Expand
  • 48
  • 3
  • PDF
A New Graphical Password: Combination of Recall & Recognition Based Approach
TLDR
In this paper, we have suggested a shoulder-surfing resistant graphical password authentication method. Expand
  • 12
  • 1
Authentication through keystrokes: What you type and how you type
TLDR
Authentication mechanism provides the basis for access control in order to ensure the information security. Expand
  • 5
  • 1
Problems in Aspect Oriented Design: Facts and Thoughts
The classic challenge in writing object-oriented programs (OOP) is finding the right decomposition into classes and objects. This problem arises whenever programmers need to deal with crosscuttingExpand
  • 2
  • 1
Offline signature verification method using weighted block analysis
TLDR
An effective signature verification method that depends on the structural property of different parts of the image has been proposed that eliminates random and simple forgeries and also reduces skilled forgery. Expand
  • 4
A Slice-based Character Recognition Technique for Handwritten Devanagari Script
TLDR
We proposed a handwritten Devanagari character recognition method using the topological and geometrical features of the character. Expand
BTpower: An Application for Remote Controlling PowerPoint Presentation Through Smartphone
TLDR
This paper presents an interesting android-based application “BTpower” which turns our phone into a remote. Expand