Author of the publication

Synthesis of Full-Adder Circuit Using Reversible Logic.

, , , and . VLSI Design, page 757-760. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine Learning Approaches for Modeling Spammer Behavior., , and . AIRS, volume 6458 of Lecture Notes in Computer Science, page 251-260. Springer, (2010)Child Abuse and Domestic Abuse: Content and Feature Analysis from Social Media Disclosures., , , , and . ADC, volume 10837 of Lecture Notes in Computer Science, page 174-185. Springer, (2018)How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond., , , , , and . IEEE Access, (2022)Chemical reaction optimization: survey on variants., , and . Evol. Intell., 12 (3): 395-420 (2019)A hybrid metaheuristic method for solving resource constrained project scheduling problem., , and . Evol. Intell., 16 (2): 519-537 (April 2023)The Effect of Dataset Imbalance on the Performance of SCADA Intrusion Detection Systems., , , , and . Sensors, 23 (2): 758 (January 2023)Assessment of ITU-R predictions for Ku-Band rain attenuation in Malaysia., , , , , and . ISTT, page 389-393. IEEE, (2014)(k - n) Oblivious Transfer Using Fully Homomorphic Encryption System., , , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 380-392. Springer, (2013)Establishing secured communications in cluster based wireless sensor networks., , and . ISWPC, page 1-6. IEEE, (2013)Extraction and Recognition of Bangla Texts from Natural Scene Images Using CNN., , and . ICISP, volume 12119 of Lecture Notes in Computer Science, page 243-253. Springer, (2020)