Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing R-tree for flash memory., , , and . Expert Syst. Appl., 42 (10): 4676-4686 (2015)Modal Policy Management Framework for Management of Distributed Systems., , , and . ICNSC, page 1753-1757. IEEE, (2008)Keywords extraction of medical information in the era of big data, and . International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019, page 1670--1674. Springer International Publishing, (2020)Correlation coefficients of dual hesitant fuzzy sets and their application in engineering management., , and . J. Ambient Intell. Humaniz. Comput., 11 (7): 2943-2961 (2020)Reliability evaluation of Modified bubble-sort graph networks based on structure fault pattern., , and . Appl. Math. Comput., (2022)A Novel Scheme for Improving Quality of Service of Live Streaming., , , , and . Informatica (Slovenia), (2015)Joint Visualization of UKF Tractography Data., , , and . ICIG (3), volume 10668 of Lecture Notes in Computer Science, page 158-169. Springer, (2017)A Reputation-Based Method to Secure Inter-Domain Routing., and . HPCC/EUC, page 1424-1429. IEEE, (2013)Lidar-enhanced wind turbine control: Past, present, and future., , , , , and . ACC, page 1399-1406. IEEE, (2016)An optimal algorithm to compute maximal relaxations in parallel., , , , and . ICNC, page 378-383. IEEE, (2014)