Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploration of connectivity with SEM: An fMRI study of resting state., , , and . Int. J. Imaging Systems and Technology, 26 (4): 264-269 (2016)Neural network methods to solve the Lane-Emden type equations arising in thermodynamic studies of the spherical gas cloud model., , , and . Neural Computing and Applications, 28 (S-1): 929-944 (2017)A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks., , , , , , , and . Sensors, 16 (3): 322 (2016)An Efficient Genetic Algorithm Based Demand Side Management Scheme for Smart Grid., , , , , , and . NBiS, page 351-356. IEEE Computer Society, (2015)A novel time series behavior matching algorithm for online conversion algorithms., and . Cluster Computing, 22 (Supplement): 7313-7320 (2019)Can online trading algorithms beat the market? An experimental evaluation., , and . SCOR, volume 22 of OASIcs, page 43-52. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2012)Behavior of attacker and some new possible attacks in Vehicular Ad hoc Network (VANET)., , , and . ICUMT, page 1-8. IEEE, (2011)Feature Selection Using Particle Swarm Optimization in Intrusion Detection.. IJDSN, (2015)Enhanced aodv route discovery and route establishment for qos provision for real time transmission in manet., , , and . CoRR, (2014)LTE efficiency when used in traffic information systems: A stable interest aware clustering., , and . Int. J. Communication Systems, (2019)