Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scenario-Based Insider Threat Detection From Cyber Activities., , and . IEEE Trans. Comput. Social Systems, 5 (3): 660-675 (2018)Conjunctive Patches Subspace Learning With Side Information for Collaborative Image Retrieval., , and . IEEE Trans. Image Processing, 21 (8): 3707-3720 (2012)A Simple Rule Extraction Method Using a Compact RBF Neural Network., and . ISNN (1), volume 3496 of Lecture Notes in Computer Science, page 682-687. Springer, (2005)Solving the Delay Constrained Multicast Routing Problem Using the Transiently Chaotic Neural Network., and . ISNN (2), volume 4492 of Lecture Notes in Computer Science, page 57-62. Springer, (2007)Editorial on: BioMedical Engineering & Informatics., and . Comput. Biol. Medicine, (2015)Soft Computing Techniques for Image Analysis in the Medical Industry Current trends, Challenges and Solutions, , , , , , , and . (2017)Gradient trajectory analysis of a scalar field with external intermittency, , and . Journal of Fluid Mechanics, 626 (1): 333-365 (2009)On properties of fluid turbulence along streamlines. Journal of Fluid Mechanics, (2010)Dissipation element analysis of scalar fields in turbulence, and . Comptes Rendus Mécanique, 334 (8-9): 493-506 (2006)An intelligent analysis and prediction model for on-demand cloud computing systems., , , , and . IJCNN, page 1036-1041. IEEE, (2014)