Author of the publication

EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS

, , , and . International Journal on Foundations of Computer Science & Technology (IJFCST), 5 (2): 8 (March 2015)
DOI: 10.5121/ijfcst.2015.5203

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Retraction notice to "Investigating the efficiency in oil futures market based on GMDH approach" Expert Systems with Applications 36 (2009) 7479-7483., , , and . Expert Syst. Appl., 42 (12): 5401 (2015)An Approach to Reduce False Alarms in an Intrusion Detection System., , and . Security and Management, page 127-132. CSREA Press, (2005)Paving the Road Towards Business to Software Unified Modeling Using Extended UML., , and . Software Engineering Research and Practice, page 165-170. CSREA Press, (2004)Normalized Similarity Index: An adjusted index to prioritize article citations., , , and . J. Informetrics, 7 (1): 91-98 (2013)A Corrective Integrated Transmission and Distribution Co-Simulation for Scenario Analysis of Different Technology Penetration., , , and . ISGT-Europe, page 680-684. IEEE, (2020)Cyber-Physical Blockchain Based Secure Platforms for Data and Energy Trading in Multi-Level Electricity Markets., , and . CCECE, page 248-255. IEEE, (2022)A New Approach Towards Mature Software Models Through Business to Software Unified Process (BSUP)., , and . IKE, page 370-378. CSREA Press, (2003)Recognizing Tenacious Graphs Is NP-Hard., , and . Ars Comb., (2014)Residual design of sink localization algorithms for wireless sensor networks., , , and . J. High Speed Networks, 25 (1): 87-99 (2019)Face recognition across makeup and plastic surgery from real-world images., , and . J. Electronic Imaging, 24 (5): 053028 (2015)