Author of the publication

Personality Determination of an Individual Through Neural Networks.

, , , , and . IPMU (1), volume 853 of Communications in Computer and Information Science, page 52-61. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards the Correctness Verifcation of Business Processes Modelled with UML., , and . JISBD, page 159-170. (2008)Parallel memetic algorithm for training recurrent neural networks for the energy efficiency problem., , and . Appl. Soft Comput., (2019)A Formal Compositional Verification Approach for Safety-Critical Systems Correctness - Model-Checking based Methodological Approach to Automatically Verify Safety Critical Systems Software., and . ICEIS (2), page 105-112. SciTePress, (2012)Distributed active objects: A methodological proposal and tool for distributed programming with transputer systems., , and . Microprocess. Microprogramming, 38 (1-5): 197-204 (1993)BTRANSFORMER - A Tool for BPMN to CSP+T Transformation., , , , , and . ICEIS (3), page 363-366. SciTePress, (2011)Conceptual framework for business processes compositional verification., , and . Inf. Softw. Technol., 54 (2): 149-161 (2012)CSPJade: Architectural Driven Development of Complex Embedded System Software Using a CSP Paradigm Based Generation Tool Code., , , and . MSVVEIS, page 128-133. INSTICC Press, (2006)Choreography Modeling Compliance for Timed Business Models., and . EOMAS@CAiSE, volume 191 of Lecture Notes in Business Information Processing, page 202-218. Springer, (2014)Design and implementation of communication patterns using parallel objects., and . Int. J. Simul. Process. Model., 12 (1): 69-91 (2017)A methodological approach for checking safety-critical systems software., and . Int. J. Crit. Comput. Based Syst., 7 (4): 341-368 (2017)