Author of the publication

Hybrid Group Recommendation Using Modified Termite Colony Algorithm: A Context Towards Big Data.

, , , , and . J. Inf. Knowl. Manag., 17 (2): 1850019:1-1850019:31 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resilient and Trustworthy Dynamic Data-driven Application Systems (DDDAS) Services for Crisis Management Environments., , , and . ICCS, volume 51 of Procedia Computer Science, page 2623-2637. Elsevier, (2015)E-profile-based security for critical transactions in web applications., , and . ICITST, page 1-2. IEEE, (2009)Erratum: "Hybrid Group Recommendation Using Modified Termite Colony Algorithm: A Context Towards Big Data"., , , , and . J. Inf. Knowl. Manag., 18 (3): 1992001:1 (2019)On the integration of artifact lifecycles., , , and . MEDES, page 59-63. ACM, (2015)Extracting Information From Coarser-grained Data in XML Documents.. J. Digit. Inf. Manag., 4 (2): 117-123 (2006)Lung cancer survival period prediction and understanding: Deep learning approaches., , and . Int. J. Medical Informatics, (2021)Towards Security Awareness in Designing Service-oriented Architectures., , , and . ICEIS (3), page 347-355. SciTePress, (2013)An Enhanced Fuzzy-Genetic Algorithm to Solve Satisfiability Problems., , and . UKSim, page 77-82. IEEE Computer Society, (2009)A Big Data based Smart Evaluation System using Public Opinion Aggregation., , , , and . ICEIS (1), page 520-527. SciTePress, (2016)Managing End-to-End Security Risks with Fuzzy Logic in Service-Oriented Architectures., and . SERVICES, page 111-117. IEEE Computer Society, (2013)