Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The SURE-LET Approach for MR Brain Image Denoising Using Different Shrinkage Rules., , and . Int. J. Heal. Inf. Syst. Informatics, 5 (2): 73-81 (2010)Thwarting DDoS attacks in grid using information divergence., and . Future Gener. Comput. Syst., 29 (1): 429-441 (2013)Performance evaluation of Data Mining algorithms on three generations of Intel® microarchitecture., and . HPCS, page 334-341. IEEE, (2015)Ubiquitous Semantic Space: A context-aware and coordination middleware for Ubiquitous Computing., , , and . COMSWARE, IEEE, (2007)Energy Efficient Integrated Routing Protocol for MANETs., , and . MSN, page 340-346. IEEE Computer Society, (2009)Early Detection of Breast Cancer using SVM Classifier Technique, and . CoRR, (2009)Semantic Discovery of Grid Services Using Functionality Based Matchmaking Algorithm., , , , , and . Web Intelligence, page 170-173. IEEE Computer Society, (2006)An Efficient Context-Aware Coordination Model for Ubiquitous Computing., , , and . MobiQuitous, page 1-6. IEEE Computer Society, (2007)Knowledge Discovery Using Neural Network., , and . IKE, page 432-438. CSREA Press, (2007)Multi-agent Based Network Performance Tuning in Grid., , , , and . BAIP, volume 70 of Communications in Computer and Information Science, page 297-304. Springer, (2010)