Author of the publication

Clustering of Human Gestures Images Using 3D Cellular Automata and N-Gram Pixels with a Visualisation aspect.

, , and . IJOCI, 5 (4): 35-60 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Detection of Contours of Circular Geologic Structures on Active Remote Sensing Images Using the Gradient Vector Flow Active Contour., and . Modeling Approaches and Algorithms for Advanced Computer Applications, volume 488 of Studies in Computational Intelligence, Springer, (2013)A Comparative Study of Machine Learning Techniques for Android Malware Detection., and . Int. J. Softw. Innov., 10 (1): 1-13 (2022)Multi-stage Genetic Algorithm and Deep Neural Network for Robot Execution Failure Detection., , and . Neural Process. Lett., 53 (6): 4527-4547 (2021)A Novel Bio Inspired Algorithm Based on Echolocation Mechanism of Bats for Seismic States Prediction., , and . Int. J. Swarm Intell. Res., 8 (3): 1-18 (2017)Optimizing Connection Weights in Neural Networks Using Hybrid Metaheuristics Algorithms., , and . Int. J. Inf. Retr. Res., 12 (1): 1-21 (2022)Machine learning tool and meta-heuristic based on genetic algorithms for plagiarism detection over mail service., , , and . ICIS, page 157-162. IEEE Computer Society, (2014)Link Analysis for Communities Detection on Facebook., , , and . CoRR, (2014)A New Meta-Heuristic based on Human Renal Function for Detection and Filtering of SPAM., , and . Int. J. Inf. Secur. Priv., 9 (4): 26-58 (2015)Combination of Access Control and De-Identification for Privacy Preserving in Big Data., , and . Int. J. Inf. Secur. Priv., 10 (1): 1-27 (2016)A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees., , and . Int. J. Inf. Secur. Priv., 11 (1): 18-34 (2017)