Autor der Publikation

Online word-of-mouth antecedents, attitude and intention-to-purchase electronic products in Pakistan.

, , , , , und . Telematics and Informatics, 33 (2): 388-400 (2016)

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

 

Weitere Publikationen von Autoren mit dem selben Namen

Online word-of-mouth antecedents, attitude and intention-to-purchase electronic products in Pakistan., , , , , und . Telematics and Informatics, 33 (2): 388-400 (2016)Saliency-directed prioritization of visual data in wireless surveillance networks., , , und . Information Fusion, (2015)Mobile cloud-assisted paradigms for management of multimedia big data in healthcare systems: Research challenges and opportunities., , , , , und . Int J. Information Management, (2019)Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices., , , , , , und . Multimedia Tools Appl., 76 (3): 3519-3536 (2017)A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image., , , , und . Multimedia Tools Appl., 75 (22): 14867-14893 (2016)A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image., , , , und . CoRR, (2015)A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption., , , , , und . TIIS, 9 (5): 1938-1962 (2015)Multi-grade brain tumor classification using deep CNN with extensive data augmentation., , , , , und . J. Comput. Science, (2019)Erratum to: Video Summarization Based Tele-endoscopy: A Service to Efficiently Manage Visual Data Generated During Wireless Capsule Endoscopy Procedure., , und . J. Medical Systems, 38 (11): 130 (2014)CNN-based anti-spoofing two-tier multi-factor authentication system., , , , , , , und . Pattern Recognition Letters, (2019)