Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Artificial Intelligence learning based on proportional navigation guidance., , and . ICACCI, page 1140-1145. IEEE, (2013)Image Encryption Using New Chaotic Map Algorithm., , and . ISDA (2), volume 941 of Advances in Intelligent Systems and Computing, page 458-466. Springer, (2018)Modeling Fuzzy Role Based Access Control Using Fuzzy Formal Concept Analysis., , and . SSCC, volume 536 of Communications in Computer and Information Science, page 176-185. Springer, (2015)e-Inu: Simulating A Quadruped Robot With Emotional Sentience., , , , , , and . CoRR, (2023)EfficientWord-Net: An Open Source Hotword Detection Engine Based on Few-Shot Learning., , , , , and . J. Inf. Knowl. Manag., 21 (4): 2250059:1-2250059:16 (2022)Augmented Reality Assistance for Aging People: A Systematic Literature Review., , and . Int. J. Inf. Syst. Soc. Chang., 13 (1): 1-17 (2022)Deep learning for Covid-19 forecasting: State-of-the-art review., , , , and . Neurocomputing, (2022)Hierarchical localization algorithm for sustainable ocean health in large-scale underwater wireless sensor networks., , , and . Sustain. Comput. Informatics Syst., (September 2023)Global Pandemics Influence on Cyber Security and Cyber Crimes., , and . CoRR, (2023)Role based access control design using three-way formal concept analysis., , and . Int. J. Mach. Learn. Cybern., 9 (11): 1807-1837 (2018)