Author of the publication

Longitudinal strain waves propagating in an infinitely long cylindrical rod composed of generally incompressible materials and its Jacobi elliptic function solutions.

, , , , , and . Math. Comput. Simul., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Evolutionary SVM Model for DDOS Attack Detection in Software Defined Networks., , , , , , and . IEEE Access, (2020)Optimal feature selection for malware detection in cyber physical systems using graph convolutional network., , , , , and . Comput. Electr. Eng., (May 2023)Hybrid model for security-aware cluster head selection in wireless sensor networks., , , , and . IET Wirel. Sens. Syst., 9 (2): 68-76 (2019)Energy and spectrum aware unequal clustering with deep learning based primary user classification in cognitive radio sensor networks., , , and . Int. J. Mach. Learn. Cybern., 12 (11): 3261-3294 (2021)A Fuzzy Based Hybrid Firefly Optimization Technique for Load Balancing in Cloud Datacenters., , , , , and . IBICA, volume 939 of Advances in Intelligent Systems and Computing, page 463-473. Springer, (2018)Design control and management of intelligent and autonomous nanorobots with artificial intelligence for Prevention and monitoring of blood related diseases., , , , , and . Eng. Appl. Artif. Intell., (2024)Improving End-Users Utility in Software-Defined Wide Area Network Systems., , , , , and . IEEE Trans. Netw. Serv. Manag., 17 (2): 696-707 (2020)Artificial bee colony method for identifying eavesdropper in terrestrial cellular networks., , , , and . Trans. Emerg. Telecommun. Technol., (2021)A Novel Approach for Privacy Preservation in Blockchain Network Using Tensor Product and a Hybrid Swarm Intelligence., and . Int. J. Mob. Comput. Multim. Commun., 12 (4): 52-71 (2021)Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks., , , , and . Clust. Comput., 20 (3): 2439-2450 (2017)