Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Action recognition based on feature extraction from time series., and . SIU, page 485-488. IEEE, (2014)Consistency-based trust management in P2P networks., and . Turkish J. Electr. Eng. Comput. Sci., 26 (2): 631-643 (2018)eFis: A Fuzzy Inference Method for Predicting Malignancy of Small Pulmonary Nodules., and . ICIAR (2), volume 8815 of Lecture Notes in Computer Science, page 255-262. Springer, (2014)Malignancy prediction by using characteristic-based fuzzy sets: A preliminary study., and . FUZZ-IEEE, page 1-6. IEEE, (2015)Evolving a Trust Model for Peer-to-Peer Networks Using Genetic Programming., , and . EvoApplications, volume 8602 of Lecture Notes in Computer Science, page 3-14. Springer, (2014)Investigation of transfer learning on pulmonary nodule characteristics., , and . SIU, page 1-4. IEEE, (2017)Anomaly Detection in Crowded Scenes Using Log-Euclidean Covariance Matrix., and . VISIGRAPP (4: VISAPP), page 279-286. SciTePress, (2018)Cyclotorsion measurement using scleral blood vessels., , , and . Comput. Biol. Medicine, (2017)Deployment and communication patterns in microservice architectures: A systematic literature review., , , and . J. Syst. Softw., (2021)ADNet: Temporal Anomaly Detection in Surveillance Videos., and . ICPR Workshops (4), volume 12664 of Lecture Notes in Computer Science, page 88-101. Springer, (2020)