Author of the publication

Multi-start stochastic competitive Hopfield neural network for frequency assignment problem in satellite communications.

, , and . Expert Syst. Appl., 38 (1): 131-145 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential Evolution with Proximity-Based Replacement Strategy and Elite Archive Mechanism for Global Optimization., , , and . ICA3PP (2), volume 11335 of Lecture Notes in Computer Science, page 76-89. Springer, (2018)Multi-start Stochastic Competitive Hopfield Neural Network for p-Median Problem., , , , and . ISNN (1), volume 5551 of Lecture Notes in Computer Science, page 75-83. Springer, (2009)Energy-efficient relay tracking with multiple mobile camera sensors., , , , , , and . Comput. Networks, (2018)Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks., , , , , , , and . IJDSN, 12 (2): 5831471:1-5831471:11 (2016)A hierarchical representation for human action recognition in realistic scenes., , , and . Multim. Tools Appl., 77 (9): 11403-11423 (2018)Detecting Steganography in Inactive Voice-Over-IP Frames Based on Statistic Characteristics of Fundamental Frequency., , , , and . IEEE Access, (2020)Design and implementation of wireless monitoring network for temperature-humidity measurement., , , and . J. Ambient Intell. Humaniz. Comput., 7 (1): 131-138 (2016)Towards blind detection of steganography in low-bit-rate speech streams., , , , , and . Int. J. Intell. Syst., 37 (12): 12085-12112 (December 2022)Three Kinds of Network Security Situation Awareness Model Based on Big Data., , and . Int. J. Netw. Secur., 21 (1): 115-121 (2019)A Secure and Reliable Data Transmission Scheme in Wireless Body Area Network., , , , and . Int. J. Netw. Secur., 21 (4): 648-660 (2019)