From post

A Comprehensive Utilization Model of Informationization Teaching Resources.

, , , , , и . ICAIS (2), том 13339 из Lecture Notes in Computer Science, стр. 373-385. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multi-carrier Steganography Algorithm Based on Executable Program., и . ICAIS (3), том 13340 из Lecture Notes in Computer Science, стр. 363-372. Springer, (2022)A Comprehensive Utilization Model of Informationization Teaching Resources., , , , , и . ICAIS (2), том 13339 из Lecture Notes in Computer Science, стр. 373-385. Springer, (2022)Research on Classroom Teaching Behavior Under the Influence of Information Technology., , , , и . ICAIS (1), том 13338 из Lecture Notes in Computer Science, стр. 485-499. Springer, (2022)A Copyright Protection Scheme of Visual Media in Big Data Environment., , , и . ICAIS (1), том 12736 из Lecture Notes in Computer Science, стр. 630-642. Springer, (2021)