Author of the publication

Normalized-Mutual-Information-Based Mining Method for Cascading Patterns.

, , , and . ISPRS Int. J. Geo Inf., 5 (10): 174 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A feature extraction method for predictive maintenance with time-lagged correlation-based curve-registration model., , , , and . Int. J. Netw. Manag., (2018)An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models., , , , , and . IEEE Trans. Ind. Informatics, 16 (2): 1024-1034 (2020)Quantification of population benefit in evaluation of biomarkers: practical implications for disease detection and prevention., , , and . BMC Medical Informatics Decis. Mak., (2014)The application of the matrix decomposition recommendation algorithm based on attribute coupling is studied in the internet of things., and . J. Intell. Fuzzy Syst., 37 (5): 6081-6089 (2019)Artificial Neural Network for Prediction of Rockburst in Deep-Buried Long Tunnel., , , and . ISNN (3), volume 3498 of Lecture Notes in Computer Science, page 983-986. Springer, (2005)Research of Secret Sharing Digital Watermarking Scheme Based on Spread Spectrum Algorithm and PCA., , , and . PCM (3), volume 11166 of Lecture Notes in Computer Science, page 793-803. Springer, (2018)Biopsy preparation for flow analysis using microfabricated disaggregation blades., , , , and . CASE, page 1-6. IEEE, (2005)A sighting-aware obstacle mobility model for ad hoc network., , and . Int. J. Wirel. Mob. Comput., 6 (4): 375-383 (2013)A Method for Deploying Distributed Denial of Service Attack Defense Strategies on Edge Servers Using Reinforcement Learning., , and . IEEE Access, (2020)基于学习者视角的算法可视化系统研究综述 (Review of Algorithm Visualization Systems: A Learner Perspective)., , and . 计算机科学, 42 (Z11): 431-437 (2015)