Author of the publication

Prediction of Conditions for Drying Clothes Based on Area and Temperature Data.

, , , and . MobiWIS, volume 10486 of Lecture Notes in Computer Science, page 57-69. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method for Knowledge Representation to Design Intelligent Problems Solver in Mathematics Based on Rela-Ops Model., , , , and . IEEE Access, (2020)A survey on software fault detection based on different prediction approaches., and . Vietnam. J. Comput. Sci., 1 (2): 79-95 (2014)Evaluating Extant Uranium: Linguistic Reasoning by Fuzzy Artificial Neural Networks., , and . SoMeT, volume 532 of Communications in Computer and Information Science, page 296-307. Springer, (2015)Hybridized term-weighting method for Dark Web classification., , , , and . Neurocomputing, (2016)Social Media for Medical and Health Information: Malaysian Medical Tourism Hospital., , , and . SoMeT, volume 303 of Frontiers in Artificial Intelligence and Applications, page 143-156. IOS Press, (2018)A New Hybrid Rough Set and Soft Set Parameter Reduction Method for Spam E-Mail Classification Task., and . PKAW, volume 9806 of Lecture Notes in Computer Science, page 18-30. Springer, (2016)Requirements engineering of Malaysian radiological medical emergency response simulator., , , , , and . J. Information Telecommunication, 2 (3): 305-321 (2018)Capturing scholar's knowledge from heterogeneous resources for profiling in recommender systems., , , and . Expert Syst. Appl., 41 (17): 7945-7957 (2014)Runtime Verification and Quality Assessment for Privacy Violations Detection in Social Networking System., and . SoMeT, volume 286 of Frontiers in Artificial Intelligence and Applications, page 346-357. IOS Press, (2016)Feature selection for phishing detection: a review of research., , and . IJISTA, 15 (2): 147-162 (2016)