Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

J-PMCRI: A Methodology for Inducing Pre-pruned Modular Classification Rules., , and . IFIP AI, volume 331 of IFIP Advances in Information and Communication Technology, page 47-56. Springer, (2010)Fuzzy Logic Decision based Collaborative Privacy Management Framework for Online Social Networks., , and . ICISSP, page 674-684. SciTePress, (2019)DOS and Brute Force Attacks Faults Detection Using an Optimised Fuzzy C-Means., and . INISTA, page 1-6. IEEE, (2019)Security and Performance Evaluation of Master Node Protocol in the Bitcoin Peer-to-Peer Network., , and . ISCC, page 1-6. IEEE, (2020)LRPF: an RF coverage reporting protocol for LTE systems., , and . IEEE Wirel. Commun., 18 (6): 64-72 (2011)Genetic Algorithm Modeling for Photocatalytic Elimination of Impurity in Wastewater., , , , , and . IntelliSys (1), volume 1037 of Advances in Intelligent Systems and Computing, page 228-236. Springer, (2019)Proximity Awareness Approach to Enhance Propagation Delay on the Bitcoin Peer-to-Peer Network., , and . ICDCS, page 2411-2416. IEEE Computer Society, (2017)Personality Filter in Mobile Networks with Communication Constraints., , and . SYNASC, page 565-568. IEEE Computer Society, (2010)Network Segregation for Fixed 802.11 Wireless Networks Utilizing Modulo., and . ICWN, page 451-457. CSREA Press, (2007)Hierarchical classification for dealing with the Class imbalance problem., , and . IJCNN, page 3584-3591. IEEE, (2016)