Author of the publication

Exploration of Carbon Nanotube Forest Synthesis-Structure Relationships Using Physics-Based Simulation and Machine Learning.

, , , , , , and . AIPR, page 1-8. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semantic scheduling of active measurements for meeting network monitoring objectives., , and . CNSM, page 435-438. IEEE, (2010)PCA-based network-wide correlated anomaly event detection and diagnosis., , , and . DRCN, page 149-156. IEEE, (2015)Fuzzy-Engineered Multi-Cloud Resource Brokering for Data-intensive Applications., , , and . CCGRID, page 257-266. IEEE, (2021)TruVR: Trustworthy Cybersickness Detection using Explainable Machine Learning., , , and . ISMAR, page 777-786. IEEE, (2022)Knowledge Graph-based Embedding for Connecting Scholars in Academic Social Networks., , , , and . DSAA, page 1-10. IEEE, (2023)Fuzzy-Based Conversational Recommender for Data-intensive Science Gateway Applications., , , , , , and . IEEE BigData, page 4870-4875. IEEE, (2018)Discovering last-matching rules in popular open-source and commercial firewalls., , , , and . Int. J. Internet Protoc. Technol., 5 (1/2): 23-31 (2010)vSocial: a cloud-based system for social virtual reality learning environment applications in special education., , , , , , and . Multim. Tools Appl., 80 (11): 16827-16856 (2021)Data-Driven Edge Computing Resource Scheduling for Protest Crowds Incident Management., , , , , and . NCA, page 1-8. IEEE, (2018)Data integrity protection through security monitoring for just-in-time news feeds., , , and . CloudNet, page 184-190. IEEE, (2015)