Author of the publication

A Data Modification Technique in PPDM Based on Ant Colony Optimization Approach.

, , , and . ICADIWT, volume 277 of Frontiers in Artificial Intelligence and Applications, page 139-149. IOS Press, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Real-time Auto-recognition Method for Pointer-meter under Uneven Illumination., , , and . RCAR, page 890-894. IEEE, (2019)A 3D LiDAR odometry for UGVs using coarse-to-fine deep scene flow estimation., , , and . Trans. Inst. Meas. Control, 45 (2): 274-286 (2023)Topology-Guided Perception-Aware Receding Horizon Trajectory Generation for UAVs., , , , , and . IROS, page 3070-3076. (2023)Fully Adaptive Framework: Neural Computerized Adaptive Testing for Online Education., , , , , and . AAAI, page 4734-4742. AAAI Press, (2022)A Comparative Analysis of Pruning Methods for C4.5 and Fuzzy C4.5., , , and . ICADIWT, volume 277 of Frontiers in Artificial Intelligence and Applications, page 304-312. IOS Press, (2015)Semantic Image Synthesis for Abdominal CT., , , , , and . DGM4MICCAI, volume 14533 of Lecture Notes in Computer Science, page 214-224. Springer, (2023)Comparative Study on M-Commerce Applications in Various Scenarios., and . Web Intelligence, page 943-946. IEEE Computer Society, (2008)A Robust Computerized Adaptive Testing Approach in Educational Question Retrieval., , , , , , , and . SIGIR, page 416-426. ACM, (2022)A Security Model for Detecting Suspicious Patterns in Physical Environment., and . IAS, page 221-226. IEEE Computer Society, (2007)Information Sharing over Collaborative Social Networks Using XACML., , and . ICEBE, page 161-167. IEEE Computer Society, (2011)