Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A log-exponential smoothing method for mathematical programs with complementarity constraints., , and . Appl. Math. Comput., 218 (10): 5900-5909 (2012)Least absolute deviation-based robust support vector regression., , , , and . Knowl. Based Syst., (2017)Learning with an active e-course in the Knowledge Grid environment., and . Concurr. Comput. Pract. Exp., 18 (3): 333-356 (2006)Extracting semantic event information from distributed sensing devices using fuzzy sets., , , , and . Fuzzy Sets Syst., (2018)Surface modeling of DEMs based on a sequential adjustment method., , and . Int. J. Geogr. Inf. Sci., 27 (7): 1272-1291 (2013)An Improved Feature Selection Method for Target Discrimination in SAR Images., and . ICIG (3), volume 10668 of Lecture Notes in Computer Science, page 633-645. Springer, (2017)Modeling Semantic Context for Active e-Learning in the Workplace., and . ICHL, volume 7411 of Lecture Notes in Computer Science, page 174-185. Springer, (2012)The Construction of a Virtual Backbone with a Bounded Diameter in a Wireless Network., , , and . Wirel. Commun. Mob. Comput., (2020)Joint 3D Beamforming and Power Allocation in Distributed Antenna Systems., , , , and . ICCS, page 89-93. IEEE, (2018)Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis, , and . International Journal of Computer Science and Security (IJCSS), 15 (3): 59-72 (June 2021)