Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network intrusion detection based on the temporal convolutional model., , , , , , and . Comput. Secur., (December 2023)Mobile Application Testing on Clouds: Challenges, Opportunities and Architectural Elements., , , , and . PDP, page 181-185. IEEE Computer Society, (2017)Evaluating geodesic active contours in microcalcifications segmentation on mammograms., , , , , and . Comput. Methods Programs Biomed., 122 (3): 304-315 (2015)A computerised information system for the analysis of hospital admission flow and characteristics., , and . Int. J. Medical Informatics, 61 (1): 11-20 (2001)Audio authenticity: detecting ENF discontinuity with high precision phase analysis., , and . IEEE Trans. Inf. Forensics Secur., 5 (3): 534-543 (2010)Adaptive IIR Notch Filters for tracking of quasi-harmonic signals., and . EUSIPCO, page 2119-2123. IEEE, (2012)Construction of Mixed Covering Arrays Using a Combination of Simulated Annealing and Variable Neighborhood Search., , , and . Electron. Notes Discret. Math., (2015)Semantic Segmentation of Mammograms Using Pre-Trained Deep Neural Networks., , and . CCE, page 1-6. IEEE, (2021)A non-linear morphometric feature selection approach for breast tumor contour from ultrasonic images., , , , and . Comput. Biol. Medicine, 40 (11-12): 912-918 (2010)Effect of the ultrasound wave propagation regime in the heat source term of Penne's bio-heat transfer equation., , and . Proc. Meet. Acoust., (2016)