Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Business Rules., , , and . ER Workshops, volume 8697 of Lecture Notes in Computer Science, page 68-73. Springer, (2013)Control Strategies and Power Decoupling Topologies to Mitigate 2ω-Ripple in Single-Phase Inverters: A Review and Open Challenges., , , , and . IEEE Access, (2020)Business Rules for Business Governance., , and . ICEIS (3), page 360-367. SciTePress, (2014)Intrusion detection system in cloud environment: Literature survey & future research directions., and . Int. J. Inf. Manag. Data Insights, 2 (2): 100134 (2022)Automatic construction of process template from business rule., , , and . IC3, page 419-424. IEEE Computer Society, (2014)Application of Artificial Intelligence Methods to Spot Welding of Commercial Aluminum Sheets (B.S. 1050)., , , and . SocProS (1), volume 335 of Advances in Intelligent Systems and Computing, page 21-32. Springer, (2014)Electronic Implementation of Biologically Inspired Neuromorphic Vision Sensor., , and . Asia International Conference on Modelling and Simulation, page 410-414. IEEE Computer Society, (2008)Arrogyam: Arrhythmia Detection for Ambulatory Patient Monitoring., and . IC3 (2), volume 95 of Communications in Computer and Information Science, page 168-180. Springer, (2010)