Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal pricing model for electronic products., , and . Comput. Ind. Eng., 56 (1): 255-259 (2009)An Application of Locally Linear Model Tree Algorithm for Predictive Accuracy of Credit Scoring., , , and . MEDI, volume 6918 of Lecture Notes in Computer Science, page 133-142. Springer, (2011)Multiobjective approach for detecting communities in heterogeneous networks., and . Comput. Intell., 33 (4): 980-1004 (2017)Robust design and planning for a multi-mode multi-product supply network: a dairy industry case study., , , and . Oper. Res., 20 (3): 1811-1840 (2020)Management Advantages of Object Classification in Role-Based Access Control (RBAC)., and . ASIAN, volume 4846 of Lecture Notes in Computer Science, page 95-110. Springer, (2007)A modular approach to ERP system selection: A case study., , and . Inf. Manag. Comput. Secur., 14 (5): 485-495 (2006)A robust trust establishment framework using Dempster-Shafer theory for MANETs., and . ICITST, page 1-7. IEEE, (2009)Efficient and secure credit card payment protocol for mobile devices., and . Int. J. Inf. Comput. Secur., 5 (2): 105-114 (2012)Multi-objective optimization model in a heterogeneous weighted network through key nodes identification in overlapping communities., , , and . Comput. Ind. Eng., (2020)Alternate Solutions for Influence Maximization: Beyond theoretical approximation by the Genetic Algorithm Framework., , and . Swarm Evol. Comput., (December 2023)