Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of knowledge based decision technique to predict student enrollment decision., , , and . ReTIS, page 180-184. IEEE, (2011)A Binary PSO Approach for Improving the Performance of Wireless Sensor Networks., , , , and . Wirel. Pers. Commun., 113 (1): 263-297 (2020)Evolution of Hyperelliptic Curve Cryptosystems., and . ICDCIT, volume 5966 of Lecture Notes in Computer Science, page 206-211. Springer, (2010)Energy Efficient Probabilistic Clustering Technique for Data Aggregation in Wireless Sensor Network., , and . Wirel. Pers. Commun., 96 (3): 4099-4113 (2017)Land Cover Feature Extraction of Multi-spectral Satellite Images Based on Extended Species Abundance Model of Biogeography., , and . Trans. Comput. Sci., (2013)Performance Analysis of Biogeography Based Land Cover Feature Extractor for Building Hybrid Intelligent Models., , and . Int. J. Appl. Evol. Comput., 4 (4): 1-26 (2013)Security engineering methods - in-depth analysis., and . Int. J. Inf. Comput. Secur., 9 (3): 180-211 (2017)MetaFusion: An efficient metasearch engine using genetic algorithm., and . IC3, page 1-6. IEEE Computer Society, (2016)Security Requirements Elicitation Using View Points for Online System., and . ICETET, page 1238-1243. IEEE Computer Society, (2008)An Improved ID-Based Key Management Scheme in Wireless Sensor Network., , and . ICSI (2), volume 7332 of Lecture Notes in Computer Science, page 351-359. Springer, (2012)