Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel non-Lyapunov approach through artificial bee colony algorithm for detecting unstable periodic orbits with high orders., , , , and . Expert Syst. Appl., 39 (16): 12389-12397 (2012)A secure and efficient data aggregation scheme for wireless sensor networks., , and . Concurrency and Computation: Practice and Experience, 23 (12): 1414-1430 (2011)Why Nonaka highlights tacit knowledge: a critical review., and . J. Knowledge Management, 7 (4): 6-14 (2003)The Essence of Organizational Knowledge: A Social Epistemology Perspective.. IJSKD, 1 (3): 63-75 (2009)A mixed behavior/structural model for analog LDPC decoders including mismatch effects and dynamic behavior., , , , and . WCSP, page 1-5. IEEE, (2015)The Updating System Of Sub-Compartment Data For Effective Forest Resource Management., , , , and . Intelligent Automation & Soft Computing, 18 (5): 477-489 (2012)Security of quantum secret sharing with two-particle entanglement against individual attacks., , , and . Quantum Information & Computation, 9 (9): 765-772 (2009)Learning decision trees using confusion entropy., , , , and . ICMLC, page 560-564. IEEE, (2013)Feature selection based on complementarity of feature classification capability., , , , and . ICMLC, page 130-135. IEEE, (2013)Modeling the Impact of Operator Trust on Performance in Multiple Robot Control., , , and . AAAI Spring Symposium: Trust and Autonomous Systems, volume SS-13-07 of AAAI Technical Report, AAAI, (2013)