Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Genetic algorithms for the 2-page book drawing problem of graphs., , and . J. Heuristics, 13 (1): 77-93 (2007)An Improved Neural Network Model for the Two-Page Crossing Number Problem., , and . IEEE Trans. Neural Networks, 17 (6): 1642-1646 (2006)Learn to Recognize Unknown SAR Targets From Reflection Similarity., , , and . IEEE Geosci. Remote. Sens. Lett., (2022)A Novel Approach for Detecting Cyberattacks in Embedded Systems Based on Anomalous Patterns of Resource Utilization-Part I., , , , and . IEEE Access, (2021)A Novel Navigation System for an Autonomous Mobile Robot in an Uncertain Environment., , and . CoRR, (2020)A heuristically self-organised Linguistic Attribute Deep Learning for edge intelligence., and . Int. J. Mach. Learn. Cybern., 13 (9): 2559-2579 (2022)A Comprehensive Obstacle Avoidance System of Mobile Robots Using an Adaptive Threshold Clustering and the Morphin Algorithm., , and . UKCI, volume 840 of Advances in Intelligent Systems and Computing, page 312-324. Springer, (2018)Online Anomaly Detection of Time Series at Scale., , , , and . CyberSA, page 1-8. IEEE, (2019)The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence., , , , , , and . CEC, page 1015-1021. IEEE, (2016)A Heuristically Self-Organised Linguistic Attribute Deep Learning in Edge Computing For IoT Intelligence., and . CoRR, (2020)