Author of the publication

Personalized e-learning system using Item Response Theory.

, , and . Comput. Educ., 44 (3): 237-255 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps., , , and . TrustCom/BigDataSE/ISPA (1), page 1014-1021. IEEE, (2015)Efficient GML-native processors for web-based GIS: techniques and tools., , , and . GIS, page 91-98. ACM, (2006)SBAD: Sequence Based Attack Detection via Sequence Comparison., , , and . PSDML, volume 6549 of Lecture Notes in Computer Science, page 78-91. Springer, (2010)A multiclass neural network classifier with fuzzy teaching inputs., , and . Fuzzy Sets Syst., 91 (1): 15-35 (1997)Personalized e-learning system using Item Response Theory., , and . Comput. Educ., 44 (3): 237-255 (2005)Using a Paper-based Digital Pen for Supporting English Courses in Regular Classrooms to Improve Reading Fluency., , and . Int. J. Humanit. Arts Comput., 7 (Supplement): 234-246 (2013)XML Evolution: A Two-phase XML Processing Model Using XML Prefiltering Techniques., , , and . VLDB, page 1215-1218. ACM, (2006)An efficient fuzzy classifier with feature selection based on fuzzy entropy., , , and . IEEE Trans. Syst. Man Cybern. Part B, 31 (3): 426-432 (2001)A Framework for Robustness Evaluation in AI-Based Malware Detectors., , and . ICCE-Taiwan, page 287-288. IEEE, (2023)DDIM-CAPTCHA: A Novel Drag-n-Drop Interactive Masking CAPTCHA against the Third Party Human Attacks., , , , and . TAAI, page 158-163. IEEE Computer Society, (2013)