Author of the publication

Personalized e-learning system using Item Response Theory.

, , and . Comput. Educ., 44 (3): 237-255 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using a Paper-based Digital Pen for Supporting English Courses in Regular Classrooms to Improve Reading Fluency., , and . Int. J. Humanit. Arts Comput., 7 (Supplement): 234-246 (2013)An efficient fuzzy classifier with feature selection based on fuzzy entropy., , , and . IEEE Trans. Syst. Man Cybern. Part B, 31 (3): 426-432 (2001)A Framework for Robustness Evaluation in AI-Based Malware Detectors., , and . ICCE-Taiwan, page 287-288. IEEE, (2023)Efficient GML-native processors for web-based GIS: techniques and tools., , , and . GIS, page 91-98. ACM, (2006)SBAD: Sequence Based Attack Detection via Sequence Comparison., , , and . PSDML, volume 6549 of Lecture Notes in Computer Science, page 78-91. Springer, (2010)DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps., , , and . TrustCom/BigDataSE/ISPA (1), page 1014-1021. IEEE, (2015)Personalized e-learning system using Item Response Theory., , and . Comput. Educ., 44 (3): 237-255 (2005)XML Evolution: A Two-phase XML Processing Model Using XML Prefiltering Techniques., , , and . VLDB, page 1215-1218. ACM, (2006)A multiclass neural network classifier with fuzzy teaching inputs., , and . Fuzzy Sets Syst., 91 (1): 15-35 (1997)How to solve collision and authentication issues using RFID protocol technology., , , , and . ICMLC, page 454-460. IEEE, (2011)