Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Role of Game Models in Social Networks.. CSE (4), page 1131-1136. IEEE Computer Society, (2009)CUDA Memory Techniques for Matrix Multiplication on Quadro 4000., , and . ITNG, page 419-425. IEEE Computer Society, (2014)GPU-based Design for Fingerprint Matching.. ICCCNT, page 36:1-36:8. ACM, (2016)Neural network model for automated system to diagnose blood clots., and . Artificial Intelligence and Applications, page 1-6. IASTED/ACTA Press, (2007)Using genetic algorithm to minimize the effect of interference for broadband wireless access network., and . ACM Southeast Regional Conference (2), page 124-125. ACM, (2005)1-59593-059-0.Big Data Security in Cloud Environment.. BigDataSecurity/HPSC/IDS, page 100-106. IEEE, (2018)Modeling Cognitive Radio Networks for Efficient Data Transfer Using Cloud Link., and . ITNG, page 525-530. IEEE Computer Society, (2013)Detection of Packet Dropping in Wireless Sensor Networks., , and . ITNG, page 879-884. IEEE Computer Society, (2010)Genetic Algorithm Approach for Adaptive Subcarrier, Bit, and Power Allocation.. ICNSC, page 14-19. IEEE, (2007)Detecting Primary Signals Using Time and Space Model.. ICWN, page 605-611. CSREA Press, (2008)