Author of the publication

Constructing an Emerging Semantic Supported Intelligence Learning Network for Web-Based Learning.

, , , and . SKG, page 49-56. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-Valued Negative Selection Algorithm with Variable-Sized Self Radius., , , , and . ICICA (LNCS), volume 7473 of Lecture Notes in Computer Science, page 229-235. Springer, (2012)A Novel Deep Transfer Learning Method for Intelligent Fault Diagnosis Based on Variational Mode Decomposition and Efficient Channel Attention., , , , , and . Entropy, 24 (8): 1087 (2022)A Supervised Classifier Based on Artificial Immune System., , , , , , and . International Conference on Computational Science (2), volume 4488 of Lecture Notes in Computer Science, page 355-362. Springer, (2007)A Computer Forensics Model Based On Danger Theory., , , , , and . IITA, page 87-90. IEEE Computer Society, (2007)A Novel Approach to IoT Security Based on Immunology., , and . CIS, page 771-775. IEEE Computer Society, (2013)Deep Transfer Network with Multi-Space Dynamic Distribution Adaptation for Bearing Fault Diagnosis., , , , , and . Entropy, 24 (8): 1122 (2022)Efficient parallel algorithm for computing rough set approximation on GPU., , , , and . Soft Comput., 22 (22): 7553-7569 (2018)Artificial Immunity-Based Discovery for Popular Information in WEB Pages., , , , , and . International Conference on Computational Science (4), volume 4490 of Lecture Notes in Computer Science, page 166-169. Springer, (2007)An Architecture for Cloud Computing and Human Immunity Based Network Intrusion Detection., , , , and . AICI, volume 7530 of Lecture Notes in Computer Science, page 309-316. Springer, (2012)Clonal Selection-Based Surveillance Algorithm for Transmission Control Protocol Anomaly Network Behavior., , , , , and . SKG, page 168-173. IEEE Computer Society, (2015)