Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Back propagation neural network approach to Intrusion Detection System., , , and . ReTIS, page 303-308. IEEE, (2011)Sensing Models and Its Impact on Network Coverage in Wireless Sensor Network., , and . ICIIS, page 1-5. IEEE, (2008)SISO Based Turbo Equalization and Decoding for ISI Corrupted Wireless Channels., , and . ICCTA, page 82-86. IEEE Computer Society, (2007)Enhanced Hypertext Categorization Using Hyperlink, , and . Proceedings of the ACM International Conference on Management of Data (ACM-SIGMOD-98), page 307--318. ACM Press, (June 1998)HawkEye solutions: a network intrusion detection system., , and . ICWET, page 252-257. ACM, (2011)Comments on Ön Determining Cluster Size of Randomly Deployed Heterogeneous WSNs"., , and . IEEE Communications Letters, 12 (10): 733 (2008)Equal energy dissipation in wireless image sensor network: A solution to energy-hole problem., , and . Comput. Electr. Eng., 39 (6): 1789-1799 (2013)Mining the Web's link structure, , , , , , , and . Computer, 32 (8): 60-67 (August 1999)An Approach to Increase the Lifetime of a Linear Array of Wireless Sensor Nodes., , , and . Int. J. Wirel. Inf. Networks, 15 (2): 72-81 (2008)Impact of sensing model on wireless sensor network coverage., , and . IET Wirel. Sens. Syst., 2 (3): 272-281 (2012)