Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Evaluation Study of General Software Project Risk Basedon Software Practitioners Experiences, , and . International Journal of Computer Science & Information Technology (IJCSIT), 8 (6): 01 - 13 (December 2016)An Evaluation Study of General Software Project Risk Basedon Software Practitioners Experiences, , and . (2016)Comparison Of Document Management Systems By Meta Modelling And Workforce Centric Tuning Measures., and . CoRR, (2014)Using a Subtractive Center Behavioral Model to Detect Malware., , and . Secur. Commun. Networks, (2020)A comprehensive appraisal of perceptual visual complexity analysis methods in GUI design., and . Displays, (2021)An inspection approach for conceptual models of the mission space in a domain specific notation (Alana özgü bir notasyonda görev uzayı kavramsal modelleri inceleme yaklaşımı). Middle East Technical University, Turkey, (2008)Multimodal Deep Learning Crime Prediction Using Tweets., and . IEEE Access, (2023)Skin Disease Classification using Few-Shot Meta-Transfer Learning., , and . SIU, page 1-4. IEEE, (2022)Investigation of the COBIT Framework Input/Output Relationships by Using Graph Metrics., and . FedCSIS, volume 2 of Annals of Computer Science and Information Systems, page 1269-1275. (2014)A Systematic Review of Challenges and Opportunities of Blockchain for E-Voting., and . Symmetry, 12 (8): 1328 (2020)