Author of the publication

A survey on issues in requirements elicitation

, , and . Computer Networks and Information Technology (ICCNIT), 2011 International Conference on, page 333 -340. (July 2011)
DOI: 10.1109/ICCNIT.2011.6020890

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey on issues in requirements elicitation, , and . Computer Networks and Information Technology (ICCNIT), 2011 International Conference on, page 333 -340. (July 2011)PERFORMANCE ANALYSIS OF A CONCATENATED LDPC CODED ALAMOUTI-BASED STBC-OFDM SYSTEM ON TEXT MESSAGE TRANSMISSION, and . International Journal of Computer Science, Engineering and Applications (IJCSEA), 01 (03): 09 (June 2011)PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM OVER AWGN AND FADING CHANNELS, , , and . International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), 1 (4): 01-13 (October 2011)Structural Analysis of Catalase from Two Musa Accessions, FHIA18 and Williams, and from Ravenala madagascariensis., , and . In Silico Biology, 8 (5-6): 413-425 (2008)A machine learning approach to recognize junk food., , , and . ICCCNT, page 1-6. IEEE, (2019)Cyber Security and People: Human Nature, Psychology, and Training Affect User Awareness, Social Engineering, and Security Professional Education and Preparedness., , , , , and . ICCCNT, page 1-5. IEEE, (2023)Handling equality constraints with agent-based memetic algorithms., , and . Memetic Comput., 3 (1): 51-72 (2011)Performance Analysis of Hard Clustering Techniques for Big IoT Data Analytics., and . CCC, page 62-66. IEEE, (2019)Infrequent pattern mining in smart healthcare environment using data summarization., and . J. Supercomput., 74 (10): 5041-5059 (2018)Faking Smart Industry: A Honeypot-Driven Approach for Exploring Cyber Security Threat Landscape., , , , , and . CrownCom/WiCON, volume 427 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 307-324. Springer, (2021)