Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Studying the effects of conflicting tokenization on LSA dimension reduction., and . ICMCS, page 542-546. IEEE, (2014)Data mining Contribution to Intrusion Detection Systems Improvement., , and . ICIST, page 6:1-6:8. ACM, (2020)Genetic Algorithm Based on Multiple Population in a Business Process Optimization Issue., , and . ICAASE, page 1-6. IEEE, (2020)Application of Multiple Population Genetic Algorithm in Optimizing Business Process., , and . IAM, volume 2748 of CEUR Workshop Proceedings, page 73-86. CEUR-WS.org, (2020)Enhancing Social Media Profile Authenticity Detection: A Bio-Inspired Algorithm Approach., , , , and . MLN, volume 14525 of Lecture Notes in Computer Science, page 32-49. Springer, (2023)Stemming effects on LSA term selection for query expansion, and . (2014)Evolutionary Multi Optimization Business Process Designs Using MR-Sort NSGAII., , , and . MSPN, volume 11005 of Lecture Notes in Computer Science, page 24-31. Springer, (2018)Optimizing Business Process Designs with a Multiple Population Genetic Algorithm., , and . WIMS, page 252-254. ACM, (2020)Bio-inspired algorithms for effective social media profile authenticity verification., , , , and . IAM, volume 3694 of CEUR Workshop Proceedings, page 109-119. CEUR-WS.org, (2023)Evolutionary Business Process Optimization using a Multiple-Criteria Decision Analysis method., , , and . CITS, page 1-5. IEEE, (2018)