Author of the publication

Automatic image annotation approach based on optimization of classes scores.

, , , and . Computing, 96 (5): 381-402 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Handwritten Signature Image., , , and . FGIT-SecTech, volume 58 of Communications in Computer and Information Science, page 43-50. Springer, (2009)Trends in high-performance computing and communications for ubiquitous computing., , and . Knowledge Eng. Review, 29 (4): 407-408 (2014)A New Authentication Scheme for Cloud-based Storage Applications., , and . SIN, page 57-60. ACM, (2016)A Comparative Study of Wireless Sensor Networks and Their Routing Protocols., , and . Sensors, 10 (12): 10506-10523 (2010)Clustering and Flow Conservation Monitoring Tool for Software Defined Networks., , and . Sensors, 18 (4): 1079 (2018)Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks., , , , and . Sensors, 16 (11): 1832 (2016)A study on dynamic state information (DSI) around users for safe urban life., , , , , and . Comput. Math. Appl., 63 (2): 554-563 (2012)RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys., , , and . Secur. Commun. Networks, (2018)Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation., , , , and . Int. J. Commun. Netw. Syst. Sci., 2 (5): 363-370 (2009)The Blockchain Solution for the Security of Internet of Energy and Electric Vehicle Interface., , , , , , , and . IEEE Trans. Veh. Technol., 70 (8): 7495-7508 (2021)