Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart and interactive ubiquitous multimedia services., , , and . Computer Communications, 35 (15): 1769-1771 (2012)Cross-national differences in individual knowledge-seeking patterns: a climato-economic contextualization., , , and . EJIS, 24 (3): 314-336 (2015)Two-Stage General Protocol for Remote Preparation of Multi-Qubit States., , , and . ICONS, page 371-376. International Federation of Automatic Control, (2013)Fuzzy Theory Based Multi-objectives Evaluation Models and their Applications on Water Resources Allocation., , and . FSKD (4), page 310-315. IEEE Computer Society, (2009)An improved projection pursuit clustering model and its application based on Quantum-behaved PSO., , , and . ICNC, page 2581-2585. IEEE, (2010)Incremental Knowledge Acquisition for WSD: A Rough Set and IL based Method., , , and . EAI Endorsed Trans. Scalable Information Systems, 2 (5): e3 (2015)Clustering PPI data based on Improved functional-flow model through Quantum-behaved PSO., , , and . IJDMB, 6 (1): 42-60 (2012)Human Identification with Electroencephalogram (EEG) for the Future Network Security., , , and . NSS, volume 7873 of Lecture Notes in Computer Science, page 575-581. Springer, (2013)EEG-Based Person Verification Using Multi-Sphere SVDD and UBM., , , , and . PAKDD (1), volume 7818 of Lecture Notes in Computer Science, page 289-300. Springer, (2013)Novel Evaluation Index for Image Quality., , and . DICTA, page 1-8. IEEE, (2014)