Author of the publication

Minimization of SADMs in Unidirectional SONET/WDM Rings Using Genetic Algorithms.

, , , , and . Handbook of Bioinspired Algorithms and Applications, Chapman and Hall/CRC, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Middleware Architecture for Secure Service Discovery using Ontologies with Multiagent Approach., , and . IJISSC, 3 (1): 47-55 (2012)A smart job scheduling system for cloud computing service providers and users: Modeling and simulation., , , , and . RAIT, page 346-351. IEEE, (2012)Minimization of SADMs in Unidirectional SONET/WDM Rings Using Genetic Algorithms., , , , and . Handbook of Bioinspired Algorithms and Applications, Chapman and Hall/CRC, (2005)An Approach Towards Development of a New Cloudlet Allocation Policy with Dynamic Time Quantum., , , and . Automatic Control and Computer Sciences, 52 (3): 208-219 (2018)An Approach Towards Amelioration of an Efficient VM Allocation Policy in Cloud Computing Domain., , and . Wireless Personal Communications, 98 (2): 1799-1820 (2018)A Dominating Set Based Data Gathering in Wireless Sensor Network using Fuzzy Logic and ACO., , and . ICIA, page 75:1-75:8. ACM, (2016)Specification based IDS for camouflaging wormhole attack in OLSR., and . MED, page 960-966. IEEE, (2015)Efficient Provenance Storage for RDF Dataset in Semantic Web Environment., , and . ICIT, page 94-100. IEEE, (2015)Minimization of Handoff Failure Probability for Next-Generation Wireless Systems, , , , , and . CoRR, (2010)Specification Based IDS for Power Enhancement Related Vulnerabilities in AODV., and . ACITY (1), volume 176 of Advances in Intelligent Systems and Computing, page 209-218. Springer, (2012)