Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Narsimha, Gugulothu
add a person with the name Narsimha, Gugulothu
 

Other publications of authors with the same name

The Effective Multicasting Routing Protocol in Wireless Mobile Adhoc Network., , and . ICN, page 15. IEEE Computer Society, (2007)Cross-layer based routing protocol and solution to packet reordering for TCP in MANET., , and . Clust. Comput., 22 (5): 10809-10816 (2019)An Intelligent Channel Assignment Approach for Minimum Interference in Wireless Mesh Networks Using Learning Automata and Genetic Algorithms., , and . Wirel. Pers. Commun., 106 (3): 1293-1307 (2019)Multiplicative Data Perturbation Using Fuzzy Logic in Preserving Privacy., , and . ICTCS, page 38:1-38:5. (2016)Secure NoSQL for the Social Networking and E-Commerce Based Bigdata Applications Deployed in Cloud., and . IJCAC, 8 (2): 113-129 (2018)Predicting the customer's opinion on amazon products using selective memory architecture-based convolutional neural network., , and . J. Supercomput., 76 (8): 5923-5947 (2020)Intrusion Detection A Text Mining Based Approach., , and . CoRR, (2016)Privacy Preserving Data Mining by Using Implicit Function Theorem, and . CoRR, (2013)Secure way routing protocol for mobile ad hoc network., and . Wireless Networks, 23 (2): 345-354 (2017)CLAPP: A self constructing feature clustering approach for anomaly detection., , , and . Future Gener. Comput. Syst., (2017)