• Publications
  • Influence
Analysis and Ranking of Software Reliability Models Based on Weighted Criteria Value
A computational methodology based on weighted criteria is presented to the problem of performance analysis of various non-homogenous Poisson process (NHPP) models. Expand
  • 48
  • 3
  • PDF
A New Graphical Password: Combination of Recall & Recognition Based Approach
In this paper, we have suggested a shoulder-surfing resistant graphical password authentication method. Expand
  • 12
  • 1
Authentication through keystrokes: What you type and how you type
Authentication mechanism provides the basis for access control in order to ensure the information security. Expand
  • 5
  • 1
Problems in Aspect Oriented Design: Facts and Thoughts
The classic challenge in writing object-oriented programs (OOP) is finding the right decomposition into classes and objects. This problem arises whenever programmers need to deal with crosscuttingExpand
  • 2
  • 1
Offline signature verification method using weighted block analysis
An effective signature verification method that depends on the structural property of different parts of the image has been proposed that eliminates random and simple forgeries and also reduces skilled forgery. Expand
  • 4
A Slice-based Character Recognition Technique for Handwritten Devanagari Script
We proposed a handwritten Devanagari character recognition method using the topological and geometrical features of the character. Expand
BTpower: An Application for Remote Controlling PowerPoint Presentation Through Smartphone
This paper presents an interesting android-based application “BTpower” which turns our phone into a remote. Expand