Author of the publication

On the Ternary Cubic Equation

, , , and . International Journal of Innovative Science and Modern Engineering (IJISME), 3 (6): 29-31 (May 2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessment of cloud vendors using interval-valued probabilistic linguistic information and unknown weights., , , , , and . Int. J. Intell. Syst., 36 (8): 3813-3851 (2021)Restrained geodetic domination of edge subdivision graph., and . Discret. Math. Algorithms Appl., 14 (5): 2250002:1-2250002:17 (2022)Critical concepts of restrained domination in signed graphs., , and . Discret. Math. Algorithms Appl., 14 (6): 2250010:1-2250010:11 (2022)A Scientific Decision Framework for Cloud Vendor Prioritization under Probabilistic Linguistic Term Set Context with Unknown/Partial Weight Information., , , , , , and . Symmetry, 11 (5): 682 (2019)Selection of Apt Renewable Energy Source for Smart Cities using Generalized Orthopair Fuzzy Information., , , , and . SSCI, page 2861-2868. IEEE, (2020)Novel Fuzzy Clustering Methods for Test Case Prioritization in Software Projects., , , , , , and . Symmetry, 11 (11): 1400 (2019)Human Resource Management System., , , , and . CoRR, (2013)Quantile correlative deep feedforward multilayer perceptron for crop yield prediction., , , , , , and . Comput. Electr. Eng., (2022)Data Grid Concepts for Data Security in Distributed Computing., , and . CoRR, (2013)Probabilistic Framework for Assessing the Threat Level using Novel Decision Constructs in Mobile Adhoc Network., and . Int. J. Netw. Secur., 20 (6): 1085-1092 (2018)