Author of the publication

An Efficient Database for Environmental Monitoring through Wireless Sensor Network.

, , , and . IKE, page 67-70. CSREA Press, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparing Object-Oriented and Data Flow Models - a Case Study., and . ACM Conference on Computer Science, page 541-547. ACM, (1992)Study of Wave Motion and Teaching Methods in Engineering Problem Solving Course., and . EDUCON, page 279-283. IEEE, (2020)System Tuning the UNIVAC Executive Operating System's Dynamic Allocator., and . Int. CMG Conference, page 213-219. Computer Measurement Group, (1981)Technology Transfer Issues for Formal Methods of Software Specification., , , , and . CSEE&T, page 23-31. IEEE Computer Society, (2000)Analyzing the cross-generalization ability of a hybrid genetic & evolutionary application for multibiometric feature weighting and selection., , , , , and . GECCO (Companion), page 1521-1522. ACM, (2012)A comparison of GEC-based feature selection and weighting for multimodal biometric recognition., , , , , , , , , and . IEEE Congress on Evolutionary Computation, page 2725-2728. IEEE, (2011)An Efficient and Accurate Text Localization Algorithm in Compressed Mobile Phone Image Domain., , , , , , and . IPCV, page 610-614. CSREA Press, (2010)Reducing Software Security Risk through an Integrated Approach., , and . WETICE, page 141-146. IEEE Computer Society, (2000)Design and Development Assessment., , , , , and . IWSSD, page 105-114. IEEE Computer Society, (2000)Intrusion-Based Attack Detection Using Machine Learning Techniques for Connected Autonomous Vehicle., , , , and . IEA/AIE, volume 13343 of Lecture Notes in Computer Science, page 505-515. Springer, (2022)