Author of the publication

Multi-dimensional data visualisation method based on convex-corrected Radviz.

, , , , , and . Int. J. Comput. Appl. Technol., 63 (1/2): 114-124 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-dimensional data visualisation method based on convex-corrected Radviz., , , , , and . Int. J. Comput. Appl. Technol., 63 (1/2): 114-124 (2020)Dsa-PAML: a parallel automated machine learning system via dual-stacked autoencoder., , , , , , and . Neural Comput. Appl., 34 (15): 12985-13006 (2022)Discussion on a new paradigm of endogenous security towards 6G networks., , , , , , , , and . Frontiers Inf. Technol. Electron. Eng., 23 (10): 1421-1450 (2022)Computation Offloading Outage Probability Analysis and Min-Max Fairness Optimization in RIS-Assisted MEC System., , , , , , and . IEEE Trans. Veh. Technol., 72 (4): 4615-4627 (April 2023)Universal approximation using dynamic recurrent neural networks: discrete-time version., , and . ICNN, page 403-408. IEEE, (1995)Robust Artificial Noise Aided Transmit Method for Multicast MISO Wiretap Channels with Imperfect Covariance-Based CSI., , , , and . VTC Spring, page 1-5. IEEE, (2015)RandPeer: Membership Management for QoS Sensitive Peer-to-Peer Applications., and . INFOCOM, IEEE, (2006)Weighted pseudo almost periodic functions and applications to evolution equations with delay., , and . Appl. Math. Comput., 219 (17): 8949-8958 (2013)Secret key generation based on private pilot under man-in-the-middle attack., , , , and . Sci. China Inf. Sci., 60 (10): 100307:1-100307:14 (2017)trieFinder: an efficient program for annotating digital gene expression (DGE) tags., , , , and . BMC Bioinform., (2014)