Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient regular expression pattern matching for network intrusion detection systems using modified word-based automata., and . SIN, page 103-110. ACM, (2012)Average BER and resource allocation in wireless powered decode-and-forward relay system., and . IET Commun., 13 (4): 379-386 (2019)Performance of Wireless Powered DF Relay System Under Nakagami-$m$ Fading: Relay Assists Energy-Constrained Source., and . IEEE Syst. J., 14 (2): 2497-2507 (2020)Spoken Language Identification Using Hybrid Feature Extraction Methods, , , and . CoRR, (2010)How Bad/Good Are the External Forward Shock Models of Gamma-Ray Bursts?, , , , , , , , , and 1 other author(s). (Mar 12, 2015)Enhancing ML model accuracy for Digital VLSI circuits using diffusion models: A study on synthetic data generation., , and . CoRR, (2023)Average SER analysis of two-hop WP DF relay system under κ - μ shadowed fading., and . IET Commun., 15 (1): 1-13 (2021)Enhancing multi-tenancy security in the cloud computing using hybrid ECC-based data encryption approach., and . IET Commun., 14 (18): 3212-3222 (2020)Information diffusion modeling and analysis for socially interacting networks., and . Soc. Netw. Anal. Min., 11 (1): 11 (2021)An interaction-based method for detecting overlapping community structure in real-world networks., and . Int. J. Data Sci. Anal., 14 (1): 27-44 (2022)