Author of the publication

A new partitioning neural network model for recursively finding arbitrary roots of higher order arbitrary polynomials.

, , , , and . Appl. Math. Comput., 162 (3): 1183-1200 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On relevance feedback and similarity measure for image retrieval with synergetic neural nets., , , and . Neurocomputing, (2003)Parallel Models and Job Characterization for System Scheduling., , , , , and . International Conference on Computational Science (2), volume 2074 of Lecture Notes in Computer Science, page 648-658. Springer, (2001)Image fusion enhancement of deformable human structures using a two-stage warping-deformable strategy: A content-based image retrieval consideration., and . Inf. Syst. Frontiers, 11 (4): 381-389 (2009)Hybrid Associative Retrieval of Three-Dimensional Models., , , and . IEEE Trans. Syst. Man Cybern. Part B, 40 (6): 1582-1595 (2010)Combining multiple clusterings using fast simulated annealing., , and . Pattern Recognit. Lett., 32 (15): 1956-1961 (2011)Combining Context, Consistency, and Diversity Cues for Interactive Image Categorization., and . IEEE Trans. Multim., 12 (3): 194-203 (2010)Use Virtual Reality to Enhance Intercultural Sensitivity: A Randomised Parallel Longitudinal Study., , and . IEEE Trans. Vis. Comput. Graph., 28 (11): 3673-3683 (2022)BodyMusic: a novel framework design for body-driven music composition., , and . Advances in Computer Entertainment Technology, page 342-345. ACM, (2005)An Iconic and Semantic Content-Based Retrieval System for Histological Images., , , , and . VISUAL, volume 1929 of Lecture Notes in Computer Science, page 488-499. Springer, (2000)Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model., , , and . J. Netw. Comput. Appl., (2017)