Author of the publication

A case study on multimedia e-tailing services: can watermarks help build customer relationships?

, , , , and . IJSTM, 14 (1): 58-76 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Development of a Generic Technique for Flow Line Monitoring., , and . Engineering Letters, 14 (1): 67-71 (2007)A novel 3D model retrieval approach using combined shape distribution., , , , , and . Multimedia Tools Appl., 69 (3): 799-818 (2014)A Generic System Monitoring Technique by Using Similarity Recognition on the Flowing Entity Pattern., , and . ICNC (5), page 389-393. IEEE Computer Society, (2007)A Hyper-Heuristic Inspired by Pearl Hunting., , , and . LION, volume 7219 of Lecture Notes in Computer Science, page 349-353. Springer, (2012)Process design for transfer moulding of electronic packages using a case-based reasoning approach with fuzzy regression adaptation., , and . Int. J. Computer Integrated Manufacturing, 18 (1): 27-40 (2005)A multi-objective evolutionary approach for fuzzy regression analysis., , , and . Expert Syst. Appl., (2019)An improved species based genetic algorithm and its application in multiple template matching for embroidered pattern inspection., , , , , and . Expert Syst. Appl., 38 (12): 15172-15182 (2011)A case study on multimedia e-tailing services: can watermarks help build customer relationships?, , , , and . IJSTM, 14 (1): 58-76 (2010)An opposition-based chaotic GA/PSO hybrid algorithm and its application in circle detection., , , , , and . Computers & Mathematics with Applications, 64 (6): 1886-1902 (2012)Application of Chaos in Network Video Security., , , , , and . ICICA (LNCS), volume 6377 of Lecture Notes in Computer Science, page 229-236. Springer, (2010)