Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Role of gender, self-efficacy, anxiety and testing formats in learning spreadsheets., , , and . Computers in Human Behavior, 29 (3): 739-746 (2013)SIM Application Toolkit - Protocol Conformance and Implementation Challenges., and . ICWMC, page 47. IEEE Computer Society, (2006)A Hybrid Approach for Feature Selection Based on Genetic Algorithm and Recursive Feature Elimination., , , and . Int. J. Inf. Syst. Model. Des., 12 (2): 17-38 (2021)An IDS scheme against Black hole Attack to Secure AOMDV Routing in MANET., , and . CoRR, (2015)A novel defense scheme against DDOS attack in VANET., , and . WOCN, page 1-5. IEEE, (2013)An Agent Based Model for Exploring Internet Hacking Trend., , and . AMCIS, page 231. Association for Information Systems, (2009)Hindi Speech Vowel Recognition Using Hidden Markov Model., , and . SLTU, page 201-204. ISCA, (2018)A novel diagnostic test generation methodology and its application in production failure isolation., , , , , , , and . ITC, page 1-10. IEEE, (2016)Dynamic social network analysis and performance evaluation., and . IJIEI, 7 (2/3): 180-202 (2019)Gradient and statistical features-based prediction system for COVID-19 using chest X-ray images., , , and . Int. J. Comput. Appl. Technol., 66 (3/4): 362-373 (2021)