Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme., , , , , and . Int. J. Netw. Secur., 19 (1): 27-38 (2017)Subarray-based FDA radar to counteract deceptive ECM signals., , , , and . EURASIP J. Adv. Signal Process., (2016)Phantom Track Identification for Radar Network Based on Multi-feature Fusion., , and . CSPS, volume 463 of Lecture Notes in Electrical Engineering, page 2746-2753. Springer, (2017)Detection of SMSP Jamming in Netted Radar System Based on Fractional Power Spectrum., , , and . CSE, page 989-993. IEEE Computer Society, (2014)New Approaches to Clustering Data - Using the Particle Swarm Optimization Algorithm., and . ICEIS (2), page 593-597. (2008)Study of different approach to clustering data by using the Particle Swarm Optimization Algorithm., , and . IEEE Congress on Evolutionary Computation, page 1817-1822. IEEE, (2008)Fitting Fuzzy Membership Functions using Hybrid Particle Swarm Optimization., and . FUZZ-IEEE, page 2112-2119. IEEE, (2006)Evolutionary computation based fuzzy membership functions optimization., and . SMC, page 823-828. IEEE, (2007)Proposition of a PSO fuzzy polynomial neural network for short-term load forecasting., , , , and . SMC, page 4224-4228. IEEE, (2010)Generate and optimize fuzzy rules using the Particle Swarm Algorithm., and . SMC, page 4244-4250. IEEE, (2010)