Author of the publication

Multiple response optimisation based on the ANN theory of complex injection moulding process.

, , and . Int. J. Comput. Appl. Technol., 50 (3/4): 186-190 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Global Exponential Stability Analysis for Uncertain Stochastic Neural Networks with Discrete and Distributed Time-Varying Delays., and . ICICA (1), volume 243 of Communications in Computer and Information Science, page 284-292. Springer, (2011)Source Camera Identification With Dual-Tree Complex Wavelet Transform., , , and . IEEE Access, (2020)Virtual chain: A storage model supporting cross-blockchain transaction., , , , and . Concurr. Comput. Pract. Exp., (2022)Soft Margin Triplet-Center Loss for Multi-View 3D Shape Retrieval., , , , and . Int. J. Pattern Recognit. Artif. Intell., 36 (4): 2250017:1-2250017:19 (2022)Computer-aided detection and diagnosis of microcalcification clusters on full field digital mammograms based on deep learning method using neutrosophic boosting., , , , , and . Multim. Tools Appl., 79 (23-24): 17147-17167 (2020)Automatic detection of contextual defects based on machine learning., , , , , , and . Int. J. Embed. Syst., 16 (1): 75-82 (2023)Label consistent locally linear embedding based cross-modal hashing., , and . Inf. Process. Manag., 57 (6): 102136 (2020)An data augmentation method for source code summarization., , , , , and . Neurocomputing, (September 2023)Binary Code Similarity Detection through LSTM and Siamese Neural Network., , , , and . EAI Endorsed Trans. Security Safety, 8 (29): e1 (2021)Security of HPC Systems: From a Log-analyzing Perspective., , , , and . EAI Endorsed Trans. Security Safety, 6 (21): e5 (2019)