Author of the publication

Computer network security evaluation simulation model based on neural network.

, and . J. Intell. Fuzzy Syst., 37 (3): 3197-3204 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum Secret Sharing in Noisy Environment., , and . ICCCS (2), volume 10603 of Lecture Notes in Computer Science, page 100-112. Springer, (2017)Real-time detection of cole diseases and insect pests in wireless sensor networks., , , and . J. Intell. Fuzzy Syst., 37 (3): 3513-3524 (2019)Artificial Intelligence as a maturing and growing technology: An urgent need for intelligent systems., and . J. Intell. Fuzzy Syst., 40 (2): 2671 (2021)A hybrid feature selection model based on butterfly optimization algorithm: COVID-19 as a case study., , and . Expert Syst. J. Knowl. Eng., (2022)Parameter identification of two dimensional digital filters using electro-magnetism optimization., , , , and . Multim. Tools Appl., 79 (7-8): 5005-5022 (2020)Cosine similarity measures of bipolar neutrosophic set for diagnosis of bipolar disorder diseases., , , , , and . Artif. Intell. Medicine, (2019)Enhancing Cryptocurrency Security Using AI Risk Management Model., , , and . IEEE Consumer Electron. Mag., 13 (1): 48-53 (January 2024)An efficient radix trie-based semantic visual indexing model for large-scale image retrieval in cloud environment., , , , and . Softw. Pract. Exp., 51 (3): 489-502 (2021)Equivalent mechanism: Releasing location data with errors through differential privacy., , and . Future Gener. Comput. Syst., (2019)Intelligent systems based on loud computing for healthcare services: a survey., , , and . Int. J. Comput. Intell. Stud., 6 (2/3): 157-188 (2017)