Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Approach of the Cryptographic Attacks., and . DICTAP (1), volume 166 of Communications in Computer and Information Science, page 521-534. Springer, (2011)Automatic Adaptation of Exposure Intensity in VR Acrophobia Therapy, based on Deep Neural Networks., , , , and . ECIS, (2019)An Investigation of Various Machine and Deep Learning Techniques Applied in Automatic Fear Level Detection and Acrophobia Virtual Therapy., , , , and . Sensors, 20 (2): 496 (2020)Towards a Human-Centered Approach for VRET Systems: Case Study for Acrophobia., , , , , and . ISD, ISEN Yncréa Méditerranée / Association for Information Systems, (2019)QORECT - A Case-Based Framework for Quality-Based Recommending Open Courseware and Open Educational Resources., , and . ICCCI, volume 8083 of Lecture Notes in Computer Science, page 681-690. Springer, (2013)Fear Level Classification Based on Emotional Dimensions and Machine Learning Techniques., , , , and . Sensors, 19 (7): 1738 (2019)A Software System for Online Learning Applied in the Field of Computer Science.. Int. J. Comput. Commun. Control, 2 (1): 84-93 (2007)The Implementation of the E-Learning Systems in Higher Education - Sharing the Work Experience from Petroleum-Gas University of Ploieşti., , and . ICWL, volume 7558 of Lecture Notes in Computer Science, page 343-348. Springer, (2012)Intelligent Management of the Cryptographic Keys., and . Int. J. Comput. Commun. Control, 6 (1): 150-157 (2011)Building the Most Creative and Innovative Collaborative Groups Using Bayes Classifiers., , and . OTM Conferences (1), volume 10573 of Lecture Notes in Computer Science, page 271-283. Springer, (2017)