Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Malware in Malicious Virtual Machines Using Tensor Analysis Techniques., , , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 821-830. IOS Press, (2014)A TSK-type fuzzy neural network (TFNN) systems for dynamic systems identification., , and . CDC, page 4002-4007. IEEE, (2003)Novel Efficient Electronic Voting Mechanism Based upon Elliptic Curve., , and . IIH-MSP, page 898-901. IEEE Computer Society, (2009)Information Exchange Mechanism Based on Reputation in Mobile P2P Networks., , , , and . IIH-MSP, page 643-646. IEEE Computer Society, (2007)Wireless Charging Deployment in Sensor Networks., and . Sensors, 19 (1): 201 (2019)A surface defect detection system for golden diamond pineapple based on CycleGAN and YOLOv4., , , , , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part A): 8041-8053 (2022)Deploying base stations for simple user traces in mobile networks., , and . ISPACS, page 164-169. IEEE, (2015)Continuous Terrain Guarding with Two-Sided Guards., and . CCCG, page 247-252. (2018)Bit-Interleaved Coded Modulation with Iterative Interference Suppression for Multi-Sequence Signaling Based MC-CDMA., , and . VTC Spring, page 2093-2097. IEEE, (2006)Iterative Interference Suppression for High-Rate Single-Carrier Space-Time Block-Coded CDMA., , and . ICC, page 4087-4092. IEEE, (2007)