Search organization content
Embedded Files
Welcome to Binod Cyber Mgmt. home
  • Home
    • Educational qualifications
    • Additional-qualification
    • Gallery
    • Work-experience
    • Publications
    • Contact information
Welcome to Binod Cyber Mgmt. home
  • Home
    • Educational qualifications
    • Additional-qualification
    • Gallery
    • Work-experience
    • Publications
    • Contact information
  • More
    • Home
      • Educational qualifications
      • Additional-qualification
      • Gallery
      • Work-experience
      • Publications
      • Contact information
  1. Singh, R. K., Kumar, B., Shaw, D. K., & Khan, D. A. (2018). Level by level image compression-encryption algorithm based on quantum chaos map. Journal of King Saud University-Compute  and Information Sciences. 

  2. Kumar, B., Singh, R. K., & Singh, A. K. (2019, February). A noble watermarking scheme based on spatial domain approach with pixe exchange and compressive sensing. In Proceedings of International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan, Jaipur-India.

  3. Kumar, B., Suman, R. R., & Singh, B. K. (2018, March). Frequency of Meeting with Node and Visit to Physical Location Based on Mobility Pattern. In International Conference on Communication, Networks and Computing (pp. 37-48). Springer, Singapore. 

  4. Paul, S., & Kumar, B. (2023, January). Elaborated Distributed System-Activity Synchronization Among Different Distributed Systems. In Machine Learning, Image Processing, Network Security and Data Sciences: 4th International Conference, MIND 2022, Virtual Event, January 19–20, 2023, Proceedings, Part II (pp. 271-280). Cham: Springer Nature Switzerland. 

Google Sites
Report abuse
Page details
Page updated
Google Sites
Report abuse