Author of the publication

Underwater clustering based hybrid routing protocol using fuzzy ELM and hybrid ABC techniques.

, , , and . J. Intell. Fuzzy Syst., 45 (1): 831-843 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Examining the impact of social media advertising using ANOVA analysis., and . Concurr. Comput. Pract. Exp., (2024)Underwater clustering based hybrid routing protocol using fuzzy ELM and hybrid ABC techniques., , , and . J. Intell. Fuzzy Syst., 45 (1): 831-843 (2023)CloneManager: A Tool for Detection of Type1 and Type2 Code Clones., , , , and . BAIP, volume 70 of Communications in Computer and Information Science, page 568-570. Springer, (2010)A vector-based approach to digital image scaling., , , , and . ICME, page 1124-1129. IEEE Computer Society, (2010)Reason to Expatriation of Construction Company Workers in UAE., and . Webology, 18 (1): 315-327 (2021)CDM Server: A Data Management Framework for Data Intensive Application in Internal Private Cloud Infrastructure., , , , and . 3PGCIC, page 211-217. IEEE, (2012)Signature authentication based on subpattern analysis., , and . Appl. Soft Comput., 11 (3): 3218-3228 (2011)The eye says it all: Periocular region methodologies., , and . ICMCS, page 180-185. IEEE, (2012)A Novel Approach for Authentication of Online Handwritten Signature Based on residuals, poles and zeros., , and . IJPRAI, 25 (1): 57-81 (2011)Homology Modeling and Protein Ligand Interaction to Identify Potential Inhibitor for E1 Protein of Chikungunya., , , , , and . ICT, volume 101 of Communications in Computer and Information Science, page 510-513. Springer, (2010)