Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dependability Attributes for increased Security in Component-based Software Development., , and . J. Comput. Sci., 10 (7): 1298-1306 (2014)Adaptive genetic algorithms.. University of Essex, UK, (2000)British Library, EThOS.Dynamic Neuro-genetic Weights Connection Strategy for Isolated Spoken Malay Speech Recognition System., , and . SPIT, volume 117 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 121-130. Springer, (2012)Self-Regulated Learning and Online Learning: A Systematic Review., , , , and . IVIC, volume 10645 of Lecture Notes in Computer Science, page 143-154. Springer, (2017)Designing GA-Based Auto-Generator of Examination Questions., , and . EMS, page 60-64. IEEE, (2012)Adaptive mechanism for GA-NN to enhance prediction model., and . IMCOM, page 101:1-101:5. ACM, (2015)Representing examination question knowledge into Genetic Algorithm., , and . EDUCON, page 900-904. IEEE, (2014)Awareness of Embedding Security Features into Component-based Software Development Model: a Survey., , and . J. Comput. Sci., 10 (8): 1411-1417 (2014)An Approach to Entertainment Tuning in RPGs: Case Study Using Diablo III and Trails of Cold Steel., , , and . GALA, volume 10056 of Lecture Notes in Computer Science, page 385-394. Springer, (2016)