Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-Time Curvature Defect Detection on Outer Surfaces Using Best-Fit Polynomial Interpolation., , and . Sensors, 12 (11): 14774-14791 (2012)Accessibility algorithm based on site availability to enhance replica selection in a data grid environment., , , and . Comput. Sci. Inf. Syst., 10 (1): 105-132 (2013)BEE-C: A bio-inspired energy efficient cluster-based algorithm for data continuous dissemination in Wireless Sensor Networks., , , , , and . ICON, page 405-410. IEEE, (2012)A dominance based rough set classification system for fault diagnosis in electrical smart grid environments., , , and . Artif. Intell. Rev., 46 (3): 389-411 (2016)Open Architecture for Distributed Search Systems., , , and . IS&N, volume 1597 of Lecture Notes in Computer Science, page 55-69. Springer, (1999)Cracking RC5 with Java applets., , and . Concurr. Pract. Exp., 10 (11-13): 1165-1171 (1998)Critical Evaluation of RFID Security Protocols., and . Int. J. Inf. Secur. Priv., 6 (3): 56-74 (2012)Safety Measures for Social Computing in Wiki Learning Environment., , , , and . Int. J. Inf. Secur. Priv., 6 (2): 1-15 (2012)Whip: A framework for mashup development with block-based development approach., , , , and . ICEEI, page 1-6. IEEE, (2011)Communication network protocols.. Comput. Commun., 9 (6): 317 (1986)