Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling Fuzzy Role Based Access Control Using Fuzzy Formal Concept Analysis., , and . SSCC, volume 536 of Communications in Computer and Information Science, page 176-185. Springer, (2015)Artificial Intelligence learning based on proportional navigation guidance., , and . ICACCI, page 1140-1145. IEEE, (2013)e-Inu: Simulating A Quadruped Robot With Emotional Sentience., , , , , , and . CoRR, (2023)EfficientWord-Net: An Open Source Hotword Detection Engine Based on Few-Shot Learning., , , , , and . J. Inf. Knowl. Manag., 21 (4): 2250059:1-2250059:16 (2022)Image Encryption Using New Chaotic Map Algorithm., , and . ISDA (2), volume 941 of Advances in Intelligent Systems and Computing, page 458-466. Springer, (2018)Comparative analysis of activation functions in neural networks., , , , and . ICECS, page 1-6. IEEE, (2021)Modeling Associative Memories Using Formal Concept Analysis., , and . INNS-CIIS, volume 331 of Advances in Intelligent Systems and Computing, page 109-118. Springer, (2014)Augmented Reality Assistance for Aging People: A Systematic Literature Review., , and . Int. J. Inf. Syst. Soc. Chang., 13 (1): 1-17 (2022)Hierarchical localization algorithm for sustainable ocean health in large-scale underwater wireless sensor networks., , , and . Sustain. Comput. Informatics Syst., (September 2023)Global Pandemics Influence on Cyber Security and Cyber Crimes., , and . CoRR, (2023)