Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robustness study in closed social networks using spanning tree approach., and . CIST, page 100-103. IEEE, (2016)Medical image watermarking for copyright protection based on Visual Cryptography., , , and . ICMCS, page 93-98. IEEE, (2014)An efficient algorithm for data security in Cloud storage., , , , and . ISDA, page 421-427. IEEE, (2015)Robust ROI Watermarking Scheme Based on Visual Cryptography: Application on Mammograms., , , and . J. Inf. Process. Syst., 11 (4): 495-508 (2015)A new local algorithm for overlapping community detection based on clustering coefficient and common neighbor similarity., , and . ArabWIC, page 7:1-7:6. ACM, (2019)A novel approach based on the minimum spanning tree to discover communities in social networks., , and . WINCOM, page 286-290. IEEE, (2016)An Innovative Combinatorial Approach for the Spanning Tree Entropy in Flower Network., , , and . NETYS, volume 10299 of Lecture Notes in Computer Science, page 3-14. (2017)The two first levels of Spider's Web planar graph and The Network planar graph., , and . ICMCS, page 57-60. IEEE, (2012)On the Terminal Wiener index of networks., , and . ICMCS, page 533-536. IEEE, (2016)An approach based on the clustering coefficient for the community detection in social networks., , and . SSIC, page 1-8. IEEE, (2016)