Author of the publication

Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks.

, and . Netw. Protoc. Algorithms, 3 (4): 122-140 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Fixed and Ladder Mutation Factor-Based Clonal Selection Algorithm for Solving Unimodal and Multimodal Functions., , , , , and . Applied Comp. Int. Soft Computing, (2011)EEECARP: Efficient Energy Clustering Adaptive Routing Procedure for Wireless Sensor Networks., , , and . J. Glob. Inf. Manag., 25 (4): 125-138 (2017)Disaster tweet classification: A majority voting approach using machine learning algorithms., , and . Intell. Decis. Technol., 17 (2): 343-355 (2023)Software Effort Estimation using Radial Basis and Generalized Regression Neural Networks, , , and . CoRR, (2010)An Experimental Study with Tensor Flow for Characteristic mining of Mathematical Formulae from a Document., , and . EAI Endorsed Trans. Scalable Inf. Syst., 6 (21): e6 (2019)Web Site Reorganization Based on Topology and Usage Patterns., , and . SocProS, volume 236 of Advances in Intelligent Systems and Computing, page 841-848. Springer, (2012)Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks., and . Netw. Protoc. Algorithms, 3 (4): 122-140 (2011)Gender Based Emotion Recognition System for Telugu Rural Dialects Using Hidden Markov Models, , , and . CoRR, (2010)Evolutionary Image Thresholding for Image Segmentation., and . IJCVIP, 9 (1): 17-34 (2019)Image Denoising Using Novel Social Grouping Optimization Algorithm with Transform Domain Technique., , , , and . Int. J. Nat. Comput. Res., 8 (4): 28-40 (2019)