Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study on the Cultivation of Core Competence Based on Tacit Knowledge., , and . ICEB, page 987-989. Academic Publishers/World Publishing Corporation, (2004)Simple Algorithms for Complex Relation Extraction with Applications to Biomedical IE, , , , , and . Proc. 43rd Annual Meeting of the Association for Computational Linguistics, (2005)A Hertzian contact based model to estimate thermal resistance of thermal interface material for high-performance microprocessors., and . Microelectron. J., (2021)Adaptive evolutionary jellyfish search algorithm based optimal photovoltaic array reconfiguration under partial shading condition for maximum power extraction., , , , , , , , , and 2 other author(s). Expert Syst. Appl., (April 2023)Are you in a Masquerade? Exploring the Behavior and Impact of Large Language Model Driven Social Bots in Online Social Networks., , and . CoRR, (2023)An Intelligent End-to-End Neural Architecture Search Framework for Electricity Forecasting Model Development., , , and . CoRR, (2022)Energy efficient prediction clustering algorithm for multilevel heterogeneous wireless sensor networks, , , and . CoRR, (2011)Distributed Dynamic Scheduling for Cyber-Physical Production Systems Based on a Multi-Agent System., , , and . IEEE Access, (2018)An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets., , , , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 601-611. Springer, (2018)DNA Computing Model of the Integer Linear Programming Problem Based on Molecular Beacon., , , and . ICIC (3), volume 4115 of Lecture Notes in Computer Science, page 238-247. Springer, (2006)