Author of the publication

Cluster Analysis and Fuzzy Query in Ship Maintenance and Design.

, , , , and . ICIC (2), volume 5755 of Lecture Notes in Computer Science, page 458-467. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Few-Sample Generation of Amount in Figures for Financial Multi-Bill Scene Based on GAN., , , , , , and . IEEE Trans. Comput. Soc. Syst., 10 (3): 1326-1334 (2023)Semi-Supervised 3D Medical Image Segmentation Based on Dual-Task Consistent Joint Learning and Task-Level Regularization., , , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 20 (4): 2457-2467 (July 2023)Using ICT to support constructive learning., and . Communications and Networking in Education, volume 163 of IFIP Conference Proceedings, page 231-242. Kluwer, (1999)Defect Passivation of Organic−Inorganic Hybrid Perovskites by Diammonium Iodide toward High-Performance Photovoltaic Devices, , , , and . (2016)Water area annual variations of nine plateau lakes in Yunnan province, China: A brief spatiotemporal analysis with landsat time series., , , , , and . IGARSS, page 6233-6236. IEEE, (2016)Aspect-aware Point-of-Interest Recommendation with Geo-Social Influence., , , , and . UMAP (Adjunct Publication), page 17-22. ACM, (2017)Lessons Learned from Optimizing the Sunway Storage System for Higher Application I/O Performance., , , , , and . J. Comput. Sci. Technol., 35 (1): 47-60 (2020)Active Mode Single Pixel Imaging in the Highly Turbid Water Environment Using Compressive Sensing., , , , and . IEEE Access, (2019)Understanding consumers' reactance of online personalized advertising: A new scheme of rational choice from a perspective of negative effects., , , and . Int. J. Inf. Manag., (2019)A confidence-based filtering method for DDoS attack defense in cloud environment., , and . Future Gener. Comput. Syst., 29 (7): 1838-1850 (2013)