Author of the publication

The effect of choosing optimizer algorithms to improve computer vision tasks: a comparative study.

, , , and . Multim. Tools Appl., 82 (11): 16591-16633 (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Quantum Steganography Protocol for Fog Cloud Internet of Things., , , , and . IEEE Access, (2018)Fog Intelligence for Real-Time IoT Sensor Data Analytics., , , , , , and . IEEE Access, (2017)A Dynamic Reconfigurable-Based Approach for Connectivity Mismatches of Web Services., and . ICDIPC (2), volume 189 of Communications in Computer and Information Science, page 67-81. Springer, (2011)Secure Medical Blockchain Model., , , , and . Inf., 14 (2): 80 (February 2023)Analysis of Plain and Diversity Combining Hybrid ARQ Protocols Over the m(geq 2)-Ary Asymmetric Channel., , and . IEEE Trans. Inf. Theory, 52 (12): 5550-5558 (2006)Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution., , , and . IEEE Access, (2023)On efficient second-order spectral-null codes using sets of m1-balancing functions., , , , , and . ISIT, page 141-145. IEEE, (2013)Big-Data Aggregating, Linking, Integrating and Representing Using Semantic Web Technologies., , and . AMLTA, volume 723 of Advances in Intelligent Systems and Computing, page 331-342. Springer, (2018)Toward cognitive support for automated defect detection., , , , , and . Neural Comput. Appl., 32 (9): 4325-4333 (2020)Efficient Non-Recursive Design of Second-Order Spectral-Null Codes., , , , , and . IEEE Trans. Inf. Theory, 62 (6): 3084-3102 (2016)