Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Manipulations of Octrees and Quadtrees on Multiprocessors., , , and . IJPRAI, 8 (2): 439-455 (1994)Adaptive Granular Neural Networks for Remote Sensing Image Classification., , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 11 (6): 1848-1857 (2018)A Comparative Analysis of Access Control Policy Modeling Approaches., and . IJSSE, 3 (4): 65-83 (2012)An Approach for End-to-End (E2E) Security of 5G Applications., , , , and . BigDataSecurity/HPSC/IDS, page 133-138. IEEE, (2018)A Novel Triangle Centroid Authentication Protocol for Cloud Environment., , , and . ACITY (1), volume 176 of Advances in Intelligent Systems and Computing, page 245-254. Springer, (2012)Estimation of Physical Properties of Calcined-alumina using Swarm Evolved Neural Net., , , , and . NaBIC, page 1264-1269. IEEE, (2009)Software effort estimation using stacked ensembled techniques and proposed stacking ensemble using principal component regression as super learner., and . J. Intell. Fuzzy Syst., 45 (6): 9697-9713 (December 2023)ESPADE: An Efficient and Semantically Secure Shortest Path Discovery for Outsourced Location-Based Services., , , and . Cryptogr., 4 (4): 29 (2020)Diagnosing COVID-19 from CT Image of Lung Segmentation & Classification with Deep Learning Based on Convolutional Neural Networks., , , , , and . Wirel. Pers. Commun., 127 (3): 2483-2499 (2022)Advancement from neural networks to deep learning in software effort estimation: Perspective of two decades., , , , and . Comput. Sci. Rev., (2020)