From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A self-adaptive migration model genetic algorithm for data mining applications., , и . Inf. Sci., 177 (20): 4295-4313 (2007)Reduction of jitter in 3D video by transmitting over multiple network paths., , , и . Int. J. Adv. Intell. Paradigms, 24 (1/2): 110-125 (2023)Bidirectional Growth based Mining and Cyclic Behaviour Analysis of Web Sequential Patterns, , , и . CoRR, (2013)Minimal Block Knight's Tour and Edge with LSB Pixel Replacement Based Encrypted Image Steganography., , и . SN Comput. Sci., 2 (3): 139 (мая 2021)Cross Layer Design for Wi-Fi Sensor Network Handling Static and Dynamic Environment Using Local Automate Based Autonomic Network Architecture., , и . SN Comput. Sci., 2 (3): 232 (2021)Sagaxsearch: an Xml Information Retrieval Mechanism Using Self Adaptive Genetic Algorithms., , , и . Int. J. Comput. Intell. Appl., 5 (4): 471-493 (2005)An Efficient Framework for Prediction in Healthcare Data Using Soft Computing Techniques., , , , , и . ACC (3), том 192 из Communications in Computer and Information Science, стр. 522-532. Springer, (2011)An Efficient Protocol to Study the Effect of Flooding on Energy Consumption in MANETS., , , , и . ACC (1), том 190 из Communications in Computer and Information Science, стр. 141-152. Springer, (2011)Steganalysis of Perturbed Quantization Using HBCL Statistics and FR Index., , , , и . ICISTM, том 141 из Communications in Computer and Information Science, стр. 51-60. Springer, (2011)Covariance Based Steganography Using DCT., , , , и . ACC (2), том 191 из Communications in Computer and Information Science, стр. 636-647. Springer, (2011)