From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hybrid Adaptive Method for Intrusion Detection with Enhanced Feature Elimination in Ensemble Learning., , и . ISDA (3), том 716 из Lecture Notes in Networks and Systems, стр. 273-280. Springer, (2022)Text Mining System for Non-Expert Miners., и . CoRR, (2014)Multimode Textile Array Antenna for Millimeter Wave Wearable Applications., , , , , и . J. Commun., 17 (11): 941-947 (2022)Proficient algorithms for enhancing topology control for dynamic clusters in MANET., и . Clust. Comput., 22 (Supplement): 9715-9726 (2019)A Computerized Doughty Predictor Framework for Corona Virus Disease: Combined Deep Learning based Approach., и . KSII Trans. Internet Inf. Syst., 16 (6): 2018-2043 (2022)Human action recognition using distance transform and entropy based features., и . Multim. Tools Appl., 80 (6): 8147-8173 (2021)Enhanced Network Anomaly Detection Using Deep Learning Based on U-Net Model., , и . ISDA (3), том 716 из Lecture Notes in Networks and Systems, стр. 237-249. Springer, (2022)Soil Nutrient Prediction Model in Hybrid Farming Using Rule-Based Regressor., , , , и . AICV, том 164 из Lecture Notes on Data Engineering and Communications Technologies, стр. 164-178. Springer, (2023)Flow Secure Message in Parity Matrix, , и . International Journal on Recent and Innovation Trends in Computing and Communication, 3 (1): 238--240 (января 2015)SecDedoop: Secure Deduplication with Access Control of Big Data in the HDFS/Hadoop Environment., и . Big Data, 8 (2): 147-163 (2020)