Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A quantization assisted U-Net study with ICA and deep features fusion for breast cancer identification using ultrasonic data., , , , , , and . PeerJ Comput. Sci., (2021)A new offloading method in the green mobile cloud computing based on a hybrid meta-heuristic algorithm., , , , and . Sustain. Comput. Informatics Syst., (2022)A New Initialization Approach in Particle Swarm Optimization for Global Optimization Problems., , , and . Comput. Intell. Neurosci., (2021)Multi-Group ObScure Logging (MG-OSLo) A Privacy-Preserving Protocol for Private Web Search., , , , , , and . IEEE Access, (2021)SEAL: Semantically Enriched Authoring in LATEX - A Model for Scientific Discourse., , , , , and . IEEE Access, (2022)Evaluating the Impact of Different Symmetrical Models of Ambient Assisted Living Systems., , , , , , , and . Symmetry, 13 (3): 450 (2021)Impact analysis of keyword extraction using contextual word embedding., , , , , , , and . PeerJ Comput. Sci., (2022)A security framework for preventing Denial of Service and Economic Denial of Sustainability attacks in the cloud computing environment.. University of South Wales, Cardiff, UK, (2016)British Library, EThOS.Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models., , , and . Complex., (2021)Exploring the Topological Properties of the Tor Dark Web., , , , , , and . IEEE Access, (2021)