Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Facial expression recognition based on completed local binary pattern and SRC., , , and . ICNC, page 333-337. IEEE, (2013)Optimising risk reduction: An expected utility approach for marginal risk reduction during regulatory decision making., , , , and . Reliab. Eng. Syst. Saf., 94 (11): 1729-1734 (2009)Goal-oriented dependency analysis for service identification., , , and . Comput. Sci. Inf. Syst., 16 (2): 381-407 (2019)Identify Patterns in Online Bin Packing Problem: An Adaptive Pattern-Based Algorithm., , , , , and . Symmetry, 14 (7): 1301 (2022)An improved YOLOv5-based vegetable disease detection method., , , , , and . Comput. Electron. Agric., (2022)Energy-Efficient Transmit Probability-Power Control for Covert D2D Communications With Age of Information Constraints., , , , , and . IEEE Trans. Veh. Technol., 71 (9): 9690-9704 (2022)The Effect of Memory Size on the Evolutionary Stability of Strategies in Iterated Prisoner's Dilemma., and . IEEE Trans. Evol. Comput., 18 (6): 819-826 (2014)Computing Nash Equilibria and Evolutionarily Stable States of Evolutionary Games., , and . IEEE Trans. Evol. Comput., 20 (3): 460-469 (2016)Preventive Dispatch Strategy Against FDIA Induced Overloads in Power Systems With High Wind Penetration., , , , and . IEEE Access, (2020)Blockchain Enabled Credibility Applications: Extant Issues, Frameworks and Cases., , , , and . IEEE Access, (2022)