Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of Ancient and Modern Cryptography Program for Documents Security.. ICICT (1), volume 1041 of Advances in Intelligent Systems and Computing, page 157-169. Springer, (2019)Efficient Controlling of Parsing-Stack Operation for LR Parsers., , , and . Inf. Sci., 118 (1-4): 145-157 (1999)Finding Good Initial Cluster Center by Using Maximum Average Distance., and . JapTAL, volume 7614 of Lecture Notes in Computer Science, page 228-238. Springer, (2012)Compression of Search Range of VP-Tree for Multimedia Data Retrieval Applications., , and . DCC, page 403. IEEE Computer Society, (2012)Study of a Reasonable Initial Center Selection Method Applied to a K-Means Clustering., , and . IEICE Trans. Inf. Syst., 96-D (8): 1727-1733 (2013)Improvement of the LR parsing table and its application to grammatical error correction., , , and . Inf. Sci., 148 (1-4): 11-26 (2002)Design and Implementation of a Document Encryption Convergence Program Selecting Encryption Methods, and Integrating the Program into the Existing Office System., and . DATA, page 452-459. SCITEPRESS, (2023)Conceptual Extraction of Compound Korean Keywords.. J. Inf. Process. Syst., 16 (2): 447-459 (2020)On Cognitive Role of Negative Schema., and . ICCSA (2), volume 3981 of Lecture Notes in Computer Science, page 231-238. Springer, (2006)Passage Segmentation Based on Topic Matter., and . Int. J. Comput. Proc. Oriental Lang., 15 (3): 305-339 (2002)