Author of the publication

GML Topology Data Storage Schema Design.

, , , , , and . J. Adv. Comput. Intell. Intell. Informatics, 11 (6): 701-708 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation and Evaluation of IPv6 with Compression and Fragmentation for Throughput Improvement of Internet of Things Networks over IEEE 802.15.4.. Wirel. Pers. Commun., 130 (2): 1449-1477 (May 2023)2T1M Neuromorphic Synapse with Pt-Hf-Ti Memristor Model., , and . SYSINT, volume 546 of Lecture Notes in Networks and Systems, page 714-726. Springer, (2022)Optimum Piezo-Electric Based Energy Harvesting for Low-Power Wireless Networks with Power Complexity Considerations., and . Wirel. Pers. Commun., 133 (4): 2355-2377 (December 2023)Multimodal biometric scheme for human authentication technique based on voice and face recognition fusion., , , and . Multim. Tools Appl., 78 (12): 16345-16361 (2019)Audio SIMO system based on visible light communication using cavity LEDs., , , , , and . Multim. Tools Appl., 82 (30): 46371-46385 (December 2023)GML Topology Data Storage Schema Design., , , , , and . J. Adv. Comput. Intell. Intell. Informatics, 11 (6): 701-708 (2007)Scalable Authentication and Nonrepudiation Technique for JPEG 2000 Images Using JPSEC Protection Tools., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (11): 2945-2954 (2006)Design of Band-Notched MIMO Antenna for UWB Applications., and . J. Commun., 16 (1): 1 (2021)Investigating of nodes and personal authentications utilizing multimodal biometrics for medical application of WBANs security., , , and . Multim. Tools Appl., 79 (33-34): 24507-24535 (2020)Access Control and Scalable Encryption Using a Stream Cipher for JPEG 2000 Encoded Images., , , and . J. Adv. Comput. Intell. Intell. Informatics, 11 (7): 728-734 (2007)