From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Iterative class diagram construction in consideration of modeling granularity., и . RCIS, стр. 101-108. IEEE, (2010)The Effect of Mobile Marketing and Email Marketing on Exploratory Information Seeking (EIS) Behavior of the Consumers: Communication Through Wireless Technologies., и . IJEIS, 13 (4): 76-89 (2017)The Impacts of Growth and Environmental Parameters on Solar-Induced Chlorophyll Fluorescence at Seasonal and Diurnal Scales., , , , , , и . Remote Sensing, 11 (17): 2002 (2019)Hybrid O(n Ön) Clustering for Sequential Web Usage Mining., и . Australian Conference on Artificial Intelligence, том 4304 из Lecture Notes in Computer Science, стр. 1022-1026. Springer, (2006)A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks., , , и . IWDW, том 10082 из Lecture Notes in Computer Science, стр. 3-15. (2016)Dolphin Swarm Extreme Learning Machine., , и . Cogn. Comput., 9 (2): 275-284 (2017)Modeling, Implementation and simulation of virtual factory based on colored timed Petri net., и . ETFA (1), стр. 574-579. IEEE, (2003)An investigation into iPod Touch generation 2., , и . InfoSecCD, стр. 94-98. ACM, (2011)Enhance learning through developing network security hands-on lab for online students., и . InfoSecCD, стр. 11:1. ACM, (2014)Virtual Battlefield Attack-Defense Countermeasure Simulation on the Grid., , , и . GCC Workshops, том 3252 из Lecture Notes in Computer Science, стр. 164-172. Springer, (2004)