Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure protocol for ad hoc transportation system., , , and . IAS, page 288-293. IEEE, (2010)Cleaning Framework for Big Data - Object Identification and Linkage., , and . BigData Congress, page 215-221. IEEE Computer Society, (2015)Modeling Work Flow in Hierarchically Cluster Distributed Systems., , and . PDPTA, page 1403-1409. CSREA Press, (2004)QoS Impact on User Perception and Understanding of Multimedia Video Clips., and . ACM Multimedia, page 49-54. ACM, (1998)A Study of Prefrontal Cortex Task Switching Using Spiking Neural Networks., , , and . ICACI, page 199-206. IEEE, (2020)Privacy Preserving Rack-Based Dynamic Workload Balancing for Hadoop MapReduce., , , , and . BigDataSecurity/HPSC/IDS, page 30-35. IEEE, (2016)Context-aware automated quality assessment of textual data., , and . Int. J. Bus. Intell. Data Min., 22 (4): 451-469 (2023)Hybrid Feature Selection for Modeling Intrusion Detection Systems., , and . ICONIP, volume 3316 of Lecture Notes in Computer Science, page 1020-1025. Springer, (2004)KeyPIn - mitigating the free rider problem in the distributed cloud based on Key, Participation, and Incentive., , , and . J. Cloud Comput., (2022)Algorithm to build quantum circuit from classical description of DFSM., , , and . QCE, page 745-748. IEEE, (2022)