Author of the publication

Data Analysis of Blended Learning in Python Programming.

, , , and . ICA3PP (3), volume 11336 of Lecture Notes in Computer Science, page 209-217. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fair intelligent bandwidth allocation for rate-adaptive video traffic., , and . Comput. Commun., 23 (14-15): 1425-1436 (2000)Collaborative Sleep Electroencephalogram Data Analysis Based on Improved Empirical Mode Decomposition and Clustering Algorithm., , , , and . Complex., (2020)Infrared enhanced absorption of TiNx nano films., , , and . NEMS, page 425-428. IEEE, (2011)A model of mining approximate frequent itemsets using rough set theory., , , , and . Int. J. Comput. Sci. Eng., 19 (1): 71-82 (2019)IPBSM: An optimal bribery selfish mining in the presence of intelligent and pure attackers., , , , , and . Int. J. Intell. Syst., 35 (11): 1735-1748 (2020)A lattice Boltzmann model for reaction dynamical systems with time delay., and . Appl. Math. Comput., 181 (2): 958-965 (2006)Optimal mixed block withholding attacks based on reinforcement learning., , , , , , , , and . Int. J. Intell. Syst., 35 (12): 2032-2048 (2020)Dynamic differential entropy and brain connectivity features based EEG emotion recognition., , , , , and . Int. J. Intell. Syst., 37 (12): 12511-12533 (December 2022)A systematic mapping study for blockchain based on complex network., , , , , , and . Concurr. Comput. Pract. Exp., (2022)Semi-selfish mining based on hidden Markov decision process., , , , , and . Int. J. Intell. Syst., 36 (7): 3596-3612 (2021)