[1] Xu, X. (2012). From cloud computing to cloud manufacturing. Robotics and computer-integrated manufacturing, 28(1), 75-86.
[2] MOHAPATRA, H. (2009). HCR using neural network (PhD’s Desertion, Biju Patnaik University of Technology).
[3] Mohapatra, H., & Rath, A. K. (2019). Detection and avoidance of water loss through municipality taps in India by using smart taps and ICT. IET wireless sensor systems, 9(6), 447-457.
[4] Mohapatra, H., & Rath, A. K. (2019). Fault tolerance in WSN through PE-LEACH protocol. IET wireless sensor systems, 9(6), 358-365.
[5] Mohapatra, H., Debnath, S., & Rath, A. K. (2019). Energy management in wireless sensor network through EB-LEACH (No. 1192). EasyChair.
[6] Nirgude, V., Nirgude, V., Mohapatra, H., & Shivarkar, S. (2017). Face recognition system using principal component analysis & linear discriminant analysis method simultaneously with 3d morphable model and neural network BPNN method. Global journal of advanced engineering technologies and sciences, 4. 1-6. https://www.researchgate.net/
[7] Panda, M., Pradhan, P., Mohapatra, H., & Barpanda, N. (2019). Fault tolerant routing in heterogeneous environment. International journal of scientific & technology research, 8(8). 1009-1013.
[8] Mohapatra, H., & Rath, A. K. (2019). Fault-tolerant mechanism for wireless sensor network. IET wireless sensor systems, 10(1), 23-30. DOI: 10.1049/iet-wss.2019.0106
[9] Swain, D., Ramkrishna, G., Mahapatra, H., Patr, P., & Dhandrao, P. M. (2013). A novel sorting technique to sort elements in ascending order. International journal of engineering and advanced technology, 3(1), 212-126.
[10] Haenlein, M., & Kaplan, A. (2019). A brief history of artificial intelligence: On the past, present, and future of artificial intelligence. California management review, 61(4), 5-14.
[11] Zheng, H., Liu, D., Wang, J., & Liang, J. (2019). A QoE-perceived screen updates transmission scheme in desktop virtualization environment. Multimedia tools and applications, 78(12), 16755-16781.
[12] Broumi, S., Dey, A., Talea, M., Bakali, A., Smarandache, F., Nagarajan, D., ... & Kumar, R. (2019). Shortest path problem using Bellman algorithm under neutrosophic environment. Complex & intelligent systems, 5(4), 409-416.
[13] Kumar, R., Edalatpanah, S. A., Jha, S., Broumi, S., Singh, R., & Dey, A. (2019). A multi objective programming approach to solve integer valued neutrosophic shortest path problems. Neutrosophic sets and systems, 24, 134-149.
[14] Kumar, R., Dey, A., Broumi, S., & Smarandache, F. (2020). A study of neutrosophic shortest path problem. In neutrosophic graph theory and algorithms (pp. 148-179). IGI Global.
[15] Kumar, R., Edalatpanah, S. A., Jha, S., & Singh, R. (2019). A novel approach to solve gaussian valued neutrosophic shortest path problems. Infinite study.
[16] Kumar, R., Edalatpanah, S. A., Jha, S., Gayen, S., & Singh, R. (2019). Shortest path problems using fuzzy weighted arc length. International journal of innovative technology and exploring engineering, 8, 724-731.
[17] Kumar, R., Edaltpanah, S. A., Jha, S., & Broumi, S. (2018). Neutrosophic shortest path problem. Neutrosophic sets and systems, 23(1), 2.
[18] Kumar, R., Jha, S., & Singh, R. (2020). A different approach for solving the shortest path problem under mixed fuzzy environment. International journal of fuzzy system applications (IJFSA), 9(2), 132-161.
[19] Kumar, R., Jha, S., & Singh, R. (2017). Shortest path problem in network with type-2 triangular fuzzy arc length. Journal of applied research on industrial engineering, 4(1), 1-7.
[20] Kumar, R., Edalatpanah, S. A., Jha, S., & Singh, R. (2019). A Pythagorean fuzzy approach to the transportation problem. Complex & intelligent systems, 5(2), 255-263.
[21] Smarandache, F., & Broumi, S. (Eds.). (2019). Neutrosophic graph theory and algorithms. Engineering science reference.
[22] Sakhnini, J., Karimipour, H., Dehghantanha, A., Parizi, R. M., & Srivastava, G. (In Press). Security aspects of Internet of things aided smart grids: a bibliometric survey. Internet of things. https://doi.org/10.1016/j.iot.2019.100111
[23] Gayen, S., Smarandache, F., Jha, S., & Kumar, R. (2019). Interval-valued neutrosophic subgroup based on interval-valued triple t-norm. In M. Abdel-Basset and F. Smarandache (Eds.), Neutrosophic sets in decision analysis and operations research. IGI-Global.
[24] Gayen, S., Smarandache, F., Jha, S., Singh, M. K., Broumi, S., & Kumar, R. (2020). Introduction to Plithogenic subgroup. Neutrosophic graph theory and algorithms (pp. 213-259). IGI Global.
[25] Umer Shuaib, M. S. (2019). On Some properties of o-anti fuzzy subgroups. Computer science, 14(1), 215-230.
[26] Gayen, S., Jha, S., Singh, M., & Kumar, R. (2019). On a generalized notion of anti-fuzzy subgroup and some characterizations. International journal of engineering and advanced technology (IJEAT), 8(3), 385-390.
[27] Kumar, S. S., Khalkho, A., Agarwal, S., Prakash, S., Prasad, D., & Nath, V. (2019). Design of smart security systems for home automation. Nanoelectronics, circuits and communication systems (pp. 599-604). Singapore: Springer.
[28] Philip, J., & Shah, D. (2019). Implementing signature recognition system as SaaS on microsoft azure cloud. In Data management, analytics and innovation (pp. 479-488). Singapore: Springer.
[29] Costa, P., Montenegro, R., Pereira, T., & Pinto, P. (2019). The security challenges emerging from the technological developments. Mobile networks and applications, 24(6), 2032-2037.
[30] Tanimoto, S., Takahashi, Y., Takeishi, A., Wangyal, S., Dechen, T., Sato, H., & Kanai, A. (2019, September). Concept proposal of multi-layer defense security countermeasures based on dynamic reconfiguration multi-perimeter lines. International conference on network-based information systems (pp. 413-422). Cham: Springer.
[31] Wen, T., Ge, Q., Lyu, X., Chen, L., Constantinou, C., Roberts, C., & Cai, B. (In Press). A cost-effective wireless network migration planning method supporting high-security enabled railway data communication systems. Journal of the franklin institute.
https://doi.org/10.1016/j.jfranklin.2019.01.037
[32] Almulhem, A. (2011, February). A graphical password authentication system. 2011 world congress on internet security (WorldCIS-2011) (pp. 223-225). IEEE.
[33] Wiedenbeck, S., Waters, J., Birget, J. C., Brodskiy, A., & Memon, N. (2005, July). Authentication using graphical passwords: Effects of tolerance and image choice. Proceedings of the 2005 symposium on usable privacy and security (pp. 1-12). https://doi.org/10.1145/1073001.1073002
[34] Lashkari, A. H., Farmand, S., Zakaria, D., Bin, O., & Saleh, D. (2009). Shoulder surfing attack in graphical password authentication. International journal of computer science and information security, 6(2), 145-154. https://arxiv.org/
[35] Gokhale A., & Waghmare, V. (2016). The recognition and recall approach based graphical password technique, International journal of computer applications, 975, 8887.
[36] Dhamija, R., & Perrig, A. (2000, August). Deja Vu-A User Study: Using Images for authentication.
Proceedings of the 9th USENIX security symposium (Vol. 9, pp. 4-4).
Denver, Colorado, USA.
https://www.usenix.org/
[37] Sun, H. M., Chen, S. T., Yeh, J. H., & Cheng, C. Y. (2016). A shoulder surfing resistant graphical authentication system. IEEE transactions on dependable and secure computing, 15(2), 180-193.
[38] Man, Sh., Hong, D., & Matthews, M. (2003). A shoulder-surfing resistant graphical password scheme - WIW. Proceedings of international conference on security and management. (pp.105-111). LasVegas, Nevada, USA: CSREA Press.
[40] Edited By: K. MORGAN, University of Bergen, Norway and J.M. SPECTOR, Syracuse University, USA
[41] WIT transactions on information and communication technologies, 30.
[42] Takada, T., & Koike, H. (2003, September). Awase-E: image-based authentication for mobile phones using user’s favorite images. International conference on mobile human-computer interaction (pp. 347-351). Berlin, Heidelberg: Springer.
[43] Eljetlawi, A. M. (2010, May). Graphical password: existing recognition base graphical password usability. INC2010: 6th international conference on networked computing (pp. 1-5). IEEE.
[44] Blonder, G. E. (1996). U.S. Patent No. 5,559,961. Washington, DC: U.S. Patent and Trademark Office.
[45] Syukri, A. F., Okamoto, E., & Mambo, M. (1998, July). A user identification system using signature written with mouse. Australasian conference on information security and privacy (pp. 403-414). Berlin, Heidelberg: Springer.
[46] Varenhorst, C., Kleek, M. V., & Rudolph, L. (2004). Passdoodles: A lightweight authentication method. Research science institute. Retrieved from
https://pdfs.semanticscholar.org/8123/44ba01a9ed10db2ec3d17a56e852ac33cc78.pdf
[47] Wiedenbeck, S., Waters, J., Birget, J. C., Brodskiy, A., & Memon, N. (2005). PassPoints: Design and longitudinal evaluation of a graphical password system. International journal of human-computer studies, 63(1-2), 102-127.
[48] Zhao, H., & Li, X. (2007, May). S3PAS: A scalable shoulder-surfing resistant textual-graphical password authentication scheme. 21st international conference on advanced information networking and applications workshops (AINAW'07) (Vol. 2, pp. 467-472). IEEE.
[49] Gao, H., Guo, X., Chen, X., Wang, L., & Liu, X. (2008, December). Yagp: Yet another graphical password strategy. In 2008 Annual computer security applications conference (ACSAC) (pp. 121-129). IEEE.
[50] Wiedenbeck, S., Waters, J., Sobrado, L., & Birget, J. C. (2006, May). Design and evaluation of a shoulder-surfing resistant graphical password scheme.
Proceedings of the working conference on advanced visual interfaces (pp. 177-184).
https://doi.org/10.1145/1133265.1133303
[51] Kumar, M., Garfinkel, T., Boneh, D., & Winograd, T. (2007, July). Reducing shoulder-surfing by using gaze-based password entry.
Proceedings of the 3rd symposium on usable privacy and security (pp. 13-19).
https://doi.org/10.1145/1280680.1280683
[52] Suo, X., Zhu, Y., & Owen, G. S. (2005, December). Graphical passwords: A survey. In 21st Annual computer security applications conference (ACSAC'05) (pp. 10-pp). IEEE.
[53] De Angeli, A., Coventry, L., Johnson, G., & Renaud, K. (2005). Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International journal of human-computer studies, 63(1-2), 128-152.
[54] Al-Turjman, F. (2019). Cognitive routing protocol for disaster-inspired internet of things. Future generation computer systems, 92, 1103-1115.