Author of the publication

Investigation of cloud computing systems in terms of Turkey and international legislation.

, , , and . SIU, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A smart trip advice model by inter-car voting data over Internet towards pleasant driving., , , , and . ICCVE, page 759-764. IEEE, (2014)A reversible data hiding scheme based on graph neighbourhood degree.. J. Exp. Theor. Artif. Intell., 29 (4): 741-753 (2017)Decision support system for major depression detection using spectrogram and convolution neural network with EEG signals., , , , , and . Expert Syst. J. Knowl. Eng., (2022)Automated malware recognition method based on local neighborhood binary pattern., , and . Multim. Tools Appl., 79 (37-38): 27815-27832 (2020)Automated malware identification method using image descriptors and singular value decomposition., , and . Multim. Tools Appl., 80 (7): 10881-10900 (2021)A deep feature warehouse and iterative MRMR based handwritten signature verification method., , , and . Multim. Tools Appl., 81 (3): 3899-3913 (2022)Exemplar Darknet19 feature generation technique for automated kidney stone detection with coronal CT images., , , , , and . Artif. Intell. Medicine, (2022)A new data hiding method based on chaos embedded genetic algorithm for color image.. Artif. Intell. Rev., 46 (1): 129-143 (2016)A Data Hiding Scheme Based on Chaotic Map and Pixel Pairs.. J. Digit. Forensics Secur. Law, 12 (4): 87-100 (2017)Automated ASD detection using hybrid deep lightweight features extracted from EEG signals., , , , , , , , and . Comput. Biol. Medicine, (2021)