Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel routing optimization strategy based on reinforcement learning in perception layer networks., , , , , and . Comput. Networks, (December 2023)A Hybrid Deep CNN Model for Abnormal Arrhythmia Detection Based on Cardiac ECG Signal., , , , , and . Sensors, 21 (3): 951 (2021)Deep Learning Models for Intelligent Healthcare: Implementation and Challenges., , , , , , , and . ICAIS (1), volume 12736 of Lecture Notes in Computer Science, page 214-225. Springer, (2021)High-Performance Linguistic Steganalysis, Capacity Estimation and Steganographic Positioning., , , , and . IWDW, volume 12617 of Lecture Notes in Computer Science, page 80-93. Springer, (2020)ENSO dataset & comparison of deep learning models for ENSO forecasting., , and . Earth Sci. Informatics, 17 (3): 2623-2628 (June 2024)Implementation and Use of Disease Diagnosis Systems for Electronic Medical Records Based on Machine Learning: A Complete Review., , , , , and . IEEE Access, (2020)An Efficient Non-Toxic and Non-Corrosive Perovskite Solar Cell., , , , , , and . IEEE Access, (2020)A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map., , , , , , and . Multim. Tools Appl., 81 (21): 30931-30959 (2022)ModPSO-CNN: an evolutionary convolution neural network with application to visual recognition., , , , , , and . Soft Comput., 25 (3): 2165-2176 (2021)Recent Development, Trends and Challenges in IoT Security., , , , , , and . ICAIS (2), volume 12737 of Lecture Notes in Computer Science, page 633-646. Springer, (2021)