Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study on suitability and importance of multilayer extreme learning machine for classification of text data., , and . Soft Comput., 21 (15): 4239-4256 (2017)Analyzing the effect of DoS attacks on network performance., , , and . UEMCON, page 372-376. IEEE, (2017)Far-out Vertices In Weighted Repeated Configuration Model, and . CoRR, (2012)Test Data Generation: A Hybrid Approach Using Cuckoo and Tabu Search., , , , , and . SEMCCO (2), volume 7077 of Lecture Notes in Computer Science, page 46-54. Springer, (2011)Adaptive Speech Recognition System Using Data From Keyboard., and . SSCI, page 2041-2044. IEEE, (2018)Network analysis of human protein location., and . BMC Bioinform., 11 (S-7): S9 (2010)Experimental validation and control of Laboratory aerial system by IC741-IOPID and IC741-FOP $I^łambda$ Controllers: An Analog approach., , , and . ICCCNT, page 1-8. IEEE, (2020)Water cycle algorithm perspective on energy constraints in WSN., , , , and . Int. J. Syst. Assur. Eng. Manag., 11 (2): 253-260 (2020)Automating Augmentation Through Random Unidimensional Search., , , , and . CoRR, (2021)Neuro-Fuzzy Model to Estimate & Optimize Quality and Performance of Component Based Software Engineering., and . ACM SIGSOFT Softw. Eng. Notes, 40 (2): 1-6 (2015)