Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing software architecture with service components using design structure matrix., , and . Int. J. Comput. Sci. Eng., 10 (1/2): 82-89 (2015)Deformable Convolutional Neuron Network Model for Detecting Tables and Columns from Document Images., and . J. Inf. Sci. Eng., 38 (6): 1305-1315 (2022)Microservices-based DevSecOps Platform using Pipeline and Open Source Software., and . J. Inf. Sci. Eng., 39 (5): 1117-1128 (September 2023)Analyzing Abstract Factory and Strategy Design Patterns using Design Structure Matrix: A Role-Playing Game Case., , , , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 1795-1804. IOS Press, (2014)Process modeling and analysis of service-oriented architecture-based wireless sensor network applications using multiple-domain matrix., and . IJDSN, (2016)LODQL: A Language for Creation, Query, and Service Generation of Linked Open Data., , , and . ICEBE, page 38-45. IEEE Computer Society, (2017)Discovering Early Aspects through Goals Interactions., , , and . APSEC, page 97-106. IEEE, (2012)State-Driven and Brick-Based Mobile Mashup., , and . IEEE MS, page 190-196. IEEE Computer Society, (2015)An Empirical Evaluation of the Effectiveness of Spider and Proxy Modes for Web Security Testing., , , and . DSA, page 587-588. IEEE, (2023)Fuzzy logic as a basic for use case point estimation., , and . FUZZ-IEEE, page 2702-2707. IEEE, (2011)