Author of the publication

Two Channel Quantum Security Modelling Focusing on Quantum Key Distribution Technique.

, , and . ICITCS, page 1-5. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two Channel Quantum Security Modelling Focusing on Quantum Key Distribution Technique., , and . ICITCS, page 1-5. IEEE Computer Society, (2015)Performance comparison of thermal aware job scheduling based on multi priorities on computational grid., , , and . ICUFN, page 419-423. IEEE, (2015)End-to-End Delay and Energy Efficient Routing Protocol for Underwater Wireless Sensor Networks., , and . Wireless Personal Communications, 79 (1): 339-361 (2014)A biological inspired fuzzy adaptive window median filter (FAWMF) for enhancing DNA signal processing., , and . Comput. Methods Programs Biomed., (2017)Parallelization of Edge Detection Algorithm using MPI on Beowulf Cluster., , , , and . SCSS, page 477-482. Springer, (2009)V2S: Voice to Sign Language Translation System for Malaysian Deaf People., , and . IVIC, volume 5857 of Lecture Notes in Computer Science, page 868-876. Springer, (2009)An Automated Software-Agents System for Detecting Road Speed Limit Offences., , and . ICSCA, page 538-543. ACM, (2019)An Optimal Scheme for UWSAN of Hotspots Issue Based on Energy-Efficient Novel Watchman Nodes., , , , , , , , and . Wirel. Pers. Commun., 121 (1): 69-94 (2021)On fuzzy semantic similarity measure for DNA coding., , and . Comput. Biol. Medicine, (2016)A QoS approach for cluster-based routing in VANETS using TDMA scheme., , , and . ICTC, page 212-217. IEEE, (2013)