Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Dynamic Substitution Box for Data Security Using an Innovative Chaotic Map., , and . IEEE Access, (2022)ICT Enabled TVET Education: A Systematic Literature Review., , , , and . IEEE Access, (2021)Using Temporal Covariance of Motion and Geometric Features via Boosting for Human Fall Detection., , , , and . Sensors, 18 (6): 1918 (2018)Self-Calibration: Enabling Self-Management in Autonomous Systems by Preserving Model Fidelity., , , , and . ICECCS, page 308-317. IEEE Computer Society, (2012)Clustering based association rule mining on online stores for optimized cross product recommendation., , , and . ICCAIS, page 176-181. IEEE, (2014)Learning and Predicting Key Web Navigation Patterns Using Bayesian Models., , and . ICCSA (2), volume 5593 of Lecture Notes in Computer Science, page 877-887. Springer, (2009)Identification of Technical and Vocational Education and Training (TVET) trainee's personality attributes which impact skills learning., and . ICACS, page 1-7. IEEE, (2024)Self-Optimizing a Clustering-based Tag Recommender for Social Bookmarking Systems., , , and . ICMLA, page 601-606. IEEE Computer Society, (2010)Discriminative Clustering for Content-Based Tag Recommendation in Social Bookmarking Systems., , , and . DC@PKDD/ECML, volume 497 of CEUR Workshop Proceedings, CEUR-WS.org, (2009)Deformable Object Tracking Using Clustering and Particle Filter., , and . Comput. Informatics, 37 (3): 717-736 (2018)