Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An intelligent virtual financial advisor system (IVFAS)., , and . Neural Networks and Computational Intelligence, page 146-151. IASTED/ACTA Press, (2004)Image Watermarking Using Psychovisual Threshold over the Edge., , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 519-527. Springer, (2013)Evaluation of Response Quality for Heterogeneous Question Answering Systems., , and . Web Intelligence, page 610-613. IEEE Computer Society, (2005)Ontology Merging and Data Schema Integration: An Approach to Identify Semantic Similarity and Resolve Schematic Heterogeneity in Interoperable GIS Application., , , , , and . ISDA, page 1179-1183. IEEE Computer Society, (2009)Training neural networks using Clonal Selection Algorithm and Particle Swarm Optimization: A comparisons for 3D object recognition., , and . HIS, page 692-697. IEEE, (2011)A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection., , , , and . Int. J. Netw. Secur., 19 (5): 727-733 (2017)Profiling mobile malware behaviour through hybrid malware analysis approach., , , , , and . IAS, page 78-84. IEEE, (2013)The Inquiry and Page Procedure in Bluetooth Connection., and . SoCPaR, page 218-222. IEEE Computer Society, (2009)Perception on Cyber Terrorism: A Focus Group Discussion Approach., , , and . J. Information Security, 3 (3): 231-237 (2012)Multilevel Thresholding Method Based on Aggressive Particle Swarm Optimization., , and . ICSECS (1), volume 179 of Communications in Computer and Information Science, page 747-757. Springer, (2011)