Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Taxonomy of Link Prediction for Social Network Analysis: A Review., , and . IEEE Access, (2020)Improving Bee Algorithm Based Feature Selection in Intrusion Detection System Using Membrane Computing., , and . J. Networks, 9 (3): 523-529 (2014)Fuzzy-Based Shapelets for Mining Climate Change Time Series Patterns., , , and . IVIC, volume 9429 of Lecture Notes in Computer Science, page 38-50. Springer, (2015)Hair data model: A new data model for Spatio-Temporal data mining., , and . DMO, page 18-22. IEEE, (2012)Integrated Membrane Computing Framework for Modeling Intrusion Detection Systems., , and . BIC-TA (1), volume 681 of Communications in Computer and Information Science, page 336-346. Springer, (2016)A text mining system for deviation detection in financial documents., , , , , , and . Intell. Data Anal., 19 (s1): S19-S44 (2015)Web screening model using multiple features., , and . ICEEI, page 1-6. IEEE, (2011)Metaheuristic approach for an enhanced mRMR filter method for classification using drug response microarray data., , and . Expert Syst. Appl., (2017)Multi-Agent System Engineering: A Methodology and Software Abstractions for Designing Agent Based Systems., , , and . Software Engineering Research and Practice, page 254-260. CSREA Press, (2007)Efficient scheduling discipline for Hierarchical Diff-EDF., and . Int. J. Netw. Manag., 18 (3): 279-294 (2008)