Author of the publication

3D-RadVis Antenna: Visualization and performance measure for many-objective optimization.

, , , and . Swarm Evol. Comput., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance., and . ICDF2C, volume 31 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 139-150. Springer, (2009)Statiscal-based skin classifier for omni-directional images., , and . VISAPP (Special Sessions), page 11-17. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, (2007)Detection of side-channel communication in ad hoc networks using request to send (RTS) messages., , , , , , and . CCECE, page 1-6. IEEE, (2014)A monitoring system for detecting repeated packets with applications to computer worms., , and . Int. J. Inf. Sec., 5 (3): 186-199 (2006)Challenges in the Effectiveness of Image Tagging Using Consumer-Grade Brain-Computer Interfaces., , , , and . AVR (2), volume 9769 of Lecture Notes in Computer Science, page 55-64. Springer, (2016)Personalized-Adaptive Learning - A Model for CIT Curricula., , , , and . ICHL, volume 8595 of Lecture Notes in Computer Science, page 266-277. Springer, (2014)Workshop on cybersecurity: security and privacy in the 21st century., , , and . CASCON, page 366. ACM, (2009)Research Issues of Privacy Access Control Model for Mobile Ad Hoc Healthcare Applications with XACML., , , , , and . AINA Workshops (2), page 582-587. IEEE Computer Society, (2007)Evaluating Hamming Distance as a Metric for the Detection of CRC-based Side-channel Communications in MANETs., , and . ANT/SEIT, volume 83 of Procedia Computer Science, page 433-440. Elsevier, (2016)System-Assigned Passwords You Can't Write Down, But Don't Need To., , and . PST, page 137-146. IEEE Computer Society, (2017)