A secure and high capacity image steganography technique UD Acharya, PR Kamath arXiv preprint arXiv:1304.3629, 2013 | 84 | 2013 |
Wavelet transform based steganography technique to hide audio signals in image S Hemalatha, UD Acharya, A Renuka Procedia Computer Science 47, 272-281, 2015 | 81 | 2015 |
A secure color image steganography in transform domain UD Acharya, PR Kamath arXiv preprint arXiv:1304.3313, 2013 | 59 | 2013 |
Cardiac Disease Prediction using Supervised Machine Learning Techniques. C Gupta, A Saha, NVS Reddy, UD Acharya Journal of Physics: Conference Series 2161 (1), 012013, 2022 | 45 | 2022 |
A new similarity measure for taxonomy based on edge counting KC Shet, UD Acharya arXiv preprint arXiv:1211.4709, 2012 | 45 | 2012 |
Comparison of different data mining techniques to predict hospital length of stay S Tanuja, DU Acharya, KR Shailesh Journal of Pharmaceutical and Biomedical Sciences 7 (7), 2011 | 45 | 2011 |
Comparison of secure and high capacity color image steganography techniques in RGB and YCbCr domains S Hemalatha, UD Acharya, A Renuka arXiv preprint arXiv:1307.3026, 2013 | 27 | 2013 |
Machine learning techniques for neonatal apnea prediction RD Shirwaikar, DU Acharya, K Makkithaya, M Surulivelrajan, LES Lewis Journal of Artificial Intelligence 9 (1-3), 2016 | 25 | 2016 |
Text line script identification for a tri-lingual document PK Aithal, G Rajesh, DU Acharya, NVKM Subbareddy 2010 Second International conference on Computing, Communication and …, 2010 | 24 | 2010 |
Krishnamoorthy: Isolated Kannada Numeral Recognition Using Structural Features and K-Means Cluster U Dinesh Acharya, S NV Proc. of IISN, 125-129, 2007 | 23 | 2007 |
A fast and novel skew estimation approach using radon transform PK Aithal, G Rajesh, UD Acharya International Journal of Computer Information Systems and Industrial …, 2013 | 22 | 2013 |
Knowledge discovery from web usage data: A survey of web usage pre-processing techniques GS Prasad, NVS Reddy, UD Acharya Information Processing and Management: International Conference on Recent …, 2010 | 21 | 2010 |
Neuro-fuzzy based hybrid model for web usage mining G Shivaprasad, NVS Reddy, UD Acharya, PK Aithal Procedia Computer Science 54, 327-334, 2015 | 20 | 2015 |
A secure image steganography technique using Integer Wavelet Transform S Hemalatha, A Renuka, UD Acharya, PR Kamath 2012 World Congress on Information and Communication Technologies, 755-758, 2012 | 20 | 2012 |
Semantic plagiarism detection system using ontology mapping MK Shenoy, KC Shet, UD Acharya Advanced Computing 3 (3), 59, 2012 | 20 | 2012 |
Zone-based structural feature extraction for script identification from Indian documents R Gopakumar, NV Subbareddy, K Makkithaya, UD Acharya 2010 5th International Conference on Industrial and Information Systems, 420-425, 2010 | 19 | 2010 |
Script identification from multilingual indian documents using structural features R Gopakumar, NV Subbareddy, K Makkithaya, DU Acharya Journal of computing 2 (7), 106-111, 2010 | 18 | 2010 |
Modeling daily reference evapotranspiration from climate variables: Assessment of bagging and boosting regression approaches J TR, NVS Reddy, UD Acharya Water Resources Management 37 (3), 1013-1032, 2023 | 17 | 2023 |
Enhanced human action recognition using fusion of skeletal joint dynamics and structural features SN Muralikrishna, B Muniyal, UD Acharya, R Holla Journal of Robotics 2020 (1), 3096858, 2020 | 17 | 2020 |
Krishnamurthy,“ U Dinesh Acharya, NVS Reddy Isolated handwritten Kannada numeral recognition using structural feature …, 2007 | 17 | 2007 |