Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data stream mining in fog computing environment with feature selection using ensemble of swarm search algorithms., , and . ICTAS, page 1-6. IEEE, (2018)Modeling and Analysis for Vertical Handoff Based on the Decision Tree in a Heterogeneous Vehicle Network., , , and . IEEE Access, (2017)Fast Expansion-Bins-Determination for Multiple Histograms Modification Based Reversible Data Hiding., , , , and . IEEE Signal Process. Lett., (2022)Discriminative feature extraction for speech recognition using continuous output codes., , , and . Pattern Recognit. Lett., 33 (13): 1703-1709 (2012)Detecting Aligned Double JPEG Compressed Color Image With Same Quantization Matrix Based on the Stability of Image., , , , , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (6): 4065-4080 (2022)An Automata Approach to Match Gapped Sequence Tags Against Protein Database., , and . CIAA, volume 3317 of Lecture Notes in Computer Science, page 167-177. Springer, (2004)AHP based supply chain performance measurement system., , and . ETFA, page 1308-1315. IEEE, (2007)Development of OmniPlusTM methodology for sustaining continuous improvements., , , , and . IEEM, page 1227-1231. IEEE, (2015)Alignment between Two Multiple Alignments., , and . CPM, volume 2676 of Lecture Notes in Computer Science, page 254-265. Springer, (2003)Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS., , , , , , , , , and . IEEE Symposium on Security and Privacy, page 357-376. IEEE Computer Society, (2016)