Author of the publication

Usability Evaluation Methods of User Interface Based on Mobile Games Using Fuzzy Methods.

, and . Smart Graphics, volume 9317 of Lecture Notes in Computer Science, page 124-131. (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

基数估计算法参数的分析与优化 (Parameter Analysis and Optimization of Cardinality Estimation Algorithm)., , and . 计算机科学, 44 (2): 279-282 (2017)BDL模型到UML状态图的可视化方法研究 (Visualization Method of BDL Model to UML State Diagram)., , , , and . 计算机科学, 42 (7): 38-43 (2015)一种改进K-means算法的聚类算法CARDBK (Clustering Algorithm CARDBK Improved from K-means Algorithm)., , , and . 计算机科学, 42 (3): 201-205 (2015)CM-Unet: A Novel Remote Sensing Image Segmentation Method Based on Improved U-Net., , , and . IEEE Access, (2023)Research of Software Defect Prediction Model Based on Complex Network and Graph Neural Network., , , and . Entropy, 24 (10): 1373 (2022)Usability Evaluation Methods of User Interface Based on Mobile Games Using Fuzzy Methods., and . Smart Graphics, volume 9317 of Lecture Notes in Computer Science, page 124-131. (2015)Statistical relational learning based automatic data cleaning., , , and . Frontiers Comput. Sci., 13 (1): 215-217 (2019)Illegal Community Detection in Bitcoin Transaction Networks., , and . Entropy, 25 (7): 1069 (July 2023)基于加权核范数最小化的矩阵填充模型 (Weighted Nuclear Norm Minimization Model for Matrix Completion)., , , and . 计算机科学, 42 (7): 254-257 (2015)Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things., , , , and . IEEE Access, (2020)