Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey on Denial of Service Attacks and Preclusions., , , and . Int. J. Inf. Secur. Priv., 11 (4): 1-15 (2017)Towards activation function search for long short-term model network: A differential evolution based approach., and . J. King Saud Univ. Comput. Inf. Sci., 34 (6 Part A): 2637-2650 (2022)Video-Based Human Activity Recognition for Elderly Using Convolutional Neural Network., , and . Int. J. Secur. Priv. Pervasive Comput., 12 (1): 36-48 (2020)Automatic Organization and Generation of Presentation Slides for E-Learning., and . Int. J. Distance Educ. Technol., 10 (3): 35-52 (2012)Deep learning-based medical expert system for diabetes diagnosis on IoT healthcare data., , and . Int. J. Soc. Comput. Cyber Phys. Syst., 2 (3): 177-193 (2021)Automatic question generation from documents for e-learning., and . IJMSO, 7 (1): 16-24 (2012)Association of domain concepts with educational objectives for e-learning., and . Bangalore Compute Conf., page 22:1-22:4. ACM, (2010)A Survey on Denial of Service Attacks and Preclusions., , , and . ICIA, page 118:1-118:10. ACM, (2016)An approach towards dynamic assembling of learning objects., , and . ICACCI, page 1193-1198. ACM, (2012)Neuroevolution based hierarchical activation function for long short-term model network., and . J. Ambient Intell. Humaniz. Comput., 12 (12): 10757-10768 (2021)