Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Rough Set and Support Vector Machine for Network Intrusion Detection, , and . International Journal of Network Security & Its Applications (IJNSA), 01 (01): 01-13 (April 2009)What determines work motivation of IT professionals: an integrated model., , , and . IJISCM, 9 (4): 300-314 (2017)Fast Adaptive K-Means Subspace Clustering for High-Dimensional Data., , , , and . IEEE Access, (2019)High-dimensional Data Clustering Using K-means Subspace Feature Selection., , and . J. Netw. Intell., 4 (3): 80-87 (2019)A recommendation system based on domain ontology and SWRL for anti-diabetic drugs selection., , , and . Expert Syst. Appl., 39 (4): 3995-4006 (2012)Semi-supervised multi-label feature selection via label correlation analysis with l1-norm graph embedding., , , , and . Image Vis. Comput., (2017)Web page classification based on a support vector machine using a weighted vote schema., and . Expert Syst. Appl., 31 (2): 427-435 (2006)A novel method for medical adverse events classification., , , and . GrC, page 115-120. IEEE Computer Society, (2011)Merging domain ontologies based on the WordNet system and Fuzzy Formal Concept Analysis techniques., , and . Appl. Soft Comput., 11 (2): 1908-1923 (2011)Decision Making Based on IoT Data Collection for Precision Agriculture., and . ACIIDS (Extended Posters), volume 830 of Studies in Computational Intelligence, page 31-42. Springer, (2019)