Author of the publication

Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis.

, , , , and . PAISI, volume 4430 of Lecture Notes in Computer Science, page 311-313. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed multiview video coding using the fusion of triple side information., , , and . ICME, page 181-184. IEEE, (2009)Comparison and analysis of accuracy of various machine learning algorithms in the classification of patients with Parkinson45s disease., , , , and . ISAIMS, page 430-435. ACM, (2023)Non-Contact Non-Invasive Heart and Respiration Rates Monitoring with MIMO Radar Sensing., , , , , , and . GLOBECOM, page 1-6. IEEE, (2018)Distributed Nash equilibrium solution for multi-agent game in adversarial environment: A reinforcement learning method., , , , and . Autom., (2025)Adaptive Intermittent Pinning Control for Synchronization of Delayed Nonlinear Memristive Neural Networks With Reaction-Diffusion Items., , , , and . IEEE Trans. Neural Networks Learn. Syst., 36 (2): 2234-2245 (February 2025)Research on Environmental Protection of Rural Ecotourism Based on PSR Model., and . Int. J. e Collab., 20 (1): 1-15 (2024)Adaptive Covariance Matrix based on Blur Evaluation for Visual-Inertial Navigation., , , and . IPMV, page 94-101. ACM, (2022)Design Thinking Based on Smart Mobile Medical Cube for Integrating Critical Emergency Care Technology and Application., , , and . ISAIMS, page 953-958. ACM, (2023)Optimal Tracking Control of Second-Order Multiagent Systems With Input Delay via Data-Driven Forward Reward Q-Learning Framework., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 55 (3): 1858-1869 (March 2025)Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis., , , , and . PAISI, volume 4430 of Lecture Notes in Computer Science, page 311-313. Springer, (2007)