Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation method for node importance based on node condensation in terrorism networks., , , , and . ISI, page 193. IEEE, (2012)Using Haptic Feedback to Improve Grasp Force Control in Multiple Sclerosis Patients., , , and . IEEE Trans. Robotics, 25 (3): 593-601 (2009)Large Scale Comparison of Gene Expression Levels by Microarrays and RNAseq Using TCGA Data, , , , , and . PLOS ONE, 8 (8): 1-10 (August 2013)Automatic extraction and visualization of semantic relations between medical entities from medicine instructions., , and . Multimedia Tools Appl., 76 (8): 10555-10573 (2017)The Probability of Dual Hesitant Fuzzy Event and Its Applications to Bayesian Network Inferences., , , and . ICNC-FSKD, volume 1074 of Advances in Intelligent Systems and Computing, page 736-755. Springer, (2019)Methodological Framework for the Transition from Requirements to Software Architectures., , and . ISD, page 139-151. Springer, (2012)Responsive pricing and stock redistribution: Implications for stock balancing and system performance., and . JORS, 69 (7): 1006-1020 (2018)An improved transfer adaptive boosting approach for mixed-project defect prediction., , and . Journal of Software: Evolution and Process, (2019)A novel approach to analyze the result of polygraph., , and . SMC, page 2884-2886. IEEE, (2000)A random set scoring model for prioritization of disease candidate genes using protein complexes and data-mining of GeneRIF, OMIM and PubMed records., , , , , and . BMC Bioinform., (2014)