Author of the publication

The scattering amplitude for a newly found exactly solvable potential

, , and . Annals of Physics, 331 (0): 313 - 316 (April 2013)
DOI: 10.1016/j.aop.2013.01.006

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EC Analysis of Multi-Antenna System over 5G and Beyond Networks and its Application to IRS-Assisted Wireless Systems., and . Wirel. Pers. Commun., 124 (2): 1861-1881 (2022)Linux CPU Schedulers: CFS, MuQSS, BMQ and CacULE Comparison., , , and . ICCCNT, page 1-7. IEEE, (2023)The scattering amplitude for a newly found exactly solvable potential, , and . Annals of Physics, 331 (0): 313 - 316 (April 2013)Secure IoT data management and sharing architecture for information security using cryptographic technique., , and . J. Intell. Fuzzy Syst., 45 (6): 10951-10966 (December 2023)FLOLSTM: Fuzzy logic-driven optimized LSTM for improved malicious traffic detection in hypervisor environments., , and . Concurr. Comput. Pract. Exp., (September 2024)CHATSEP: Critical heterogeneous adaptive threshold sensitive election protocol for Wireless Sensor Networks., and . ICACCI, page 80-86. IEEE, (2014)Congestion Aware Data Transmission in Mobile and Constrained IoT Network., , and . Wirel. Pers. Commun., 130 (3): 2121-2136 (June 2023)Effective Capacity Analysis Over Fisher-Snedecor F Fading Channels with MRC Reception., and . Wirel. Pers. Commun., 121 (3): 1693-1705 (2021)MEMIS: Multimodal Emergency Management Information System., , , , , and . ECIR (1), volume 12035 of Lecture Notes in Computer Science, page 479-494. Springer, (2020)Cyber-Attacks Detection Using Intelligent Intrusion System (IDS) Along With Deep Learning: Novel Approach., and . ICCCNT, page 1-7. IEEE, (2023)