Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Solution of sensing failure problem: an improved two-stage detector., and . Comput. J., 61 (6): 847-855 (2018)Unconstrained Face Detection of Multiple Humans Present in the Video., , and . Wirel. Pers. Commun., 118 (2): 901-917 (2021)Performance Evaluation Techniques for Mobile Communication Systems., and . CICSyN, page 511-515. IEEE Computer Society, (2009)An Advanced Congestion Adaptive Routing Mechanism., , and . CICSyN, page 153-157. IEEE, (2012)Intersection Attack on Anonymity in VANET., , and . Trans. Comput. Sci., (2013)Two-Stage Detectors with Multiple Energy Detectors and Adaptive Double Threshold in Cognitive Radio Networks., and . Int. J. Distributed Sens. Networks, (2013)The Performance Metric for Enterprise Service Bus (ESB) in SOA system: Theoretical underpinnings and empirical illustrations for information processing., , and . Inf. Syst., (2017)Pseudonym Based Mechanism for Sustaining Privacy in VANETs., , , and . CICSyN, page 420-425. IEEE Computer Society, (2009)Dynamic Multi-level Hierarchal Clustering Approach for Wireless Sensor Networks., and . UKSim, page 563-567. IEEE Computer Society, (2009)Robust Watermarking of Image in the Transform Domain Using Edge Detection., , and . UKSim, page 233-238. IEEE Computer Society, (2009)