Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RMDL: Random Multimodel Deep Learning for Classification, , , , and . Proceedings of the 2018 International Conference on Information System and Data Mining, (2018)From Videos to URLs: A Multi-Browser Guide To Extract User's Behavior with Optical Character Recognition., , , , , and . CoRR, (2018)Cultural Dimension Theory Based Simulations for US Army Personnel., , , and . SBP-BRiMS, volume 10354 of Lecture Notes in Computer Science, page 65-70. Springer, (2017)Screening for Barrett's Esophagus with Probe-Based Confocal Laser Endomicroscopy Videos., , , , , and . ISBI, page 1659-1663. IEEE, (2020)Self-attentive Adversarial Stain Normalization., , , , , , , , , and . ICPR Workshops (1), volume 12661 of Lecture Notes in Computer Science, page 120-140. Springer, (2020)A comparison of evaluation methods for police patrol district designs., , , and . WSC, page 2532-2543. IEEE, (2013)A Generalized Multiple Response Surface Methodology for Complex Computer Simulation Applications., and . WSC, page 958-966. IEEE Computer Society, (2004)A High Throughput Packet-Switched Network Technique Without Message Reassembly., , and . IEEE Trans. Commun., 23 (8): 819-828 (1975)Data mining time series with applications to crime analysis., and . SMC, page 1453-1458. IEEE, (2001)Text Classification Algorithms: A Survey, , , , , and . (2019)cite arxiv:1904.08067.