Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Architecture for Network Intrusion Detection and Prevention., , and . IEEE Access, (2019)Enhancing the low quality images using Unsupervised Colour Correction Method., , , , and . SMC, page 1703-1709. IEEE, (2010)An efficient image retrieval scheme for colour enhancement of embedded and distributed surveillance images., , , , , and . Neurocomputing, (2016)Integrated image enhancement method for biometric security., , and . SMC, page 1716-1721. IEEE, (2011)Project management system review and redesign using user-centred design methodology., , , and . CSCWD, page 139-145. IEEE, (2011)Collaborative design of computer network using Activity-Led Learning approach., , , and . CSCWD, page 146-153. IEEE, (2011)A general user-defined negotiation application-based AuTrA system for computer supported collaboration work., , and . CSCWD, page 131-138. IEEE, (2011)Supporting information exchange among software developers through the development of Collaborative Information Retrieval utilities., , , and . CSCWD, page 78-83. IEEE, (2013)V-ROOM: Virtual meeting system trial., , and . CSCWD, page 563-569. IEEE, (2013)CPS data streams analytics based on machine learning for Cloud and Fog Computing: A survey., , , , , , , and . Future Gener. Comput. Syst., (2019)