Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Method of Semi-supervised Automatic Keyword Extraction for Web Documents using Transition Probability Distribution Generator., , , , and . RACS, page 1-6. ACM, (2016)International Network Performance and Security Testing Based on Distributed Abyss Storage Cluster and Draft of Data Lake Framework., , , , and . Secur. Commun. Networks, (2018)Detection of malicious code using the direct hashing and pruning and support vector machine., , and . Concurr. Comput. Pract. Exp., (2020)Security Enhancement for Smartphone Using Biometrics in Cyber-Physical Systems., , , , and . Int. J. Distributed Sens. Networks, (2014)Dynamic Chameleon Authentication Tree for Verifiable Data Streaming in 5G Networks., , , , , and . IEEE Access, (2017)A term normalization method for efficient knowledge acquisition through text processing., , , , , , and . Multim. Tools Appl., 65 (1): 75-91 (2013)A Method for Recommending the Most Appropriate Expansion of Acronyms Using Wikipedia., , , and . IMIS, page 217-220. IEEE Computer Society, (2013)Adaptive-Tangent Space Representation for Image Retrieval Based on Kansei., , , , , , and . MICAI, volume 4293 of Lecture Notes in Computer Science, page 828-837. Springer, (2006)Multiresolution Face Recognition through Virtual Faces Generation Using a Single Image for One Person., , , and . Wirel. Commun. Mob. Comput., (2018)A novel double linear-cubic convolution interpolation for digital image scaling., , , and . SAC, page 1733-1734. ACM, (2014)