Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image Contrast Enhancement Using Hybrid Elitist Ant System, Elitism-Based Immigrants Genetic Algorithm and Simulated Annealing., , , and . CVIP (1), volume 703 of Advances in Intelligent Systems and Computing, page 115-129. Springer, (2017)Hybrid analysis of executables to detect security vulnerabilities: security vulnerabilities., , and . ISEC, page 141-142. ACM, (2009)Shape analysis of the neostriatum in frontotemporal lobar degeneration, Alzheimer's disease, and controls., , , , , , , , , and 2 other author(s). NeuroImage, 51 (3): 970-986 (2010)A novel approach based on nature inspired intelligence for face feature extraction and recognition., , and . IC3, page 149-153. IEEE, (2013)Realization of multimethods in single dispatch object oriented languages., , and . ACM SIGPLAN Notices, 40 (5): 18-27 (2005)Efficient Message Dispatch in Object-Oriented Systems., and . ACM SIGPLAN Notices, 35 (3): 49-58 (2000)A Novel Application of Harmonics Spread Spectrum Technique for Acoustic Noise and Vibration Reduction of PMSM Drive., , and . IEEE Access, (2020)Effective Evolutionary Multimodal Optimization by Multiobjective Reformulation Without Explicit Niching/Sharing., and . AACC, volume 3285 of Lecture Notes in Computer Science, page 1-8. Springer, (2004)Passive Bandwidth Estimation Techniques for QoS Routing in Wireless LANs.. SocProS (2), volume 1057 of Advances in Intelligent Systems and Computing, page 443-452. Springer, (2018)Vowel and non-vowel frame segmentation based digital speech watermarking technique using LPA method., and . J. Inf. Secur. Appl., (2022)