Author of the publication

Computational method for identifying the boundaries of crime with street profile and discrete calculus.

, , , , and . ASONAM, page 851-854. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SARNA-Predict: A Simulated Annealing Algorithm for RNA Secondary Structure Prediction, and . Proceedings of the IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology, page 466--475. (2006)A Comparison of Computational Intelligence Techniques for Real-Time Discrete Multivariate Time Series Classification of Conducting Gestures., , , and . ICVS, volume 11754 of Lecture Notes in Computer Science, page 573-585. Springer, (2019)Modeling HIV spread through sexual contact using a cellular automaton., , , and . IEEE Congress on Evolutionary Computation, page 2345-2350. IEEE, (2011)Length-Based Substructure Mutation Policies for Improved RNA Design in Simulated Annealing., and . CIBCB, page 1-9. IEEE, (2022)Examination of Annealing Schedules for RNA Design., and . CEC, page 1-8. IEEE, (2020)Minding the Gap: Bridging Computing Science and Business Studies with an Interdisciplinary Innovation Challenge, and . Proceedings of the 15th Western Canadian Conference on Computing Education, page 14:1--14:5. New York, NY, USA, ACM, (2010)SARNA-Predict-pk: Predicting RNA Secondary Structures Including Pseudoknots, and . Proceedings of the IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology, page 1--8. (2008)Meta-analysis of small RNA-sequencing errors reveals ubiquitous post-transcriptional RNA modifications., , , , , and . Nucleic Acids Research, 37 (8): 2461--2470 (May 1, 2009)An agent-based model and computational framework for counter-terrorism and public safety based on swarm intelligence, , , and . Security Informatics, 1 (1): 1--9 (2012)SARNA-Predict: Using Adaptive Annealing Schedule and Inversion Mutation Operator for RNA Secondary Structure Prediction, and . Proceedings of the IEEE Symposium Series on Computational Intelligence, page 150--156. (2014)