Author of the publication

Development of Real-Time Learning Components Using Expanded SCORM.

, , , , and . ICHIT (2), volume 206 of Communications in Computer and Information Science, page 501-512. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Approach for Simplifying Neural Networks by Identifying Decoupling Inputs., and . Australian Conference on Artificial Intelligence, volume 3339 of Lecture Notes in Computer Science, page 754-765. Springer, (2004)Neural Network Based Adult Image Classification., , , and . ICANN (1), volume 3696 of Lecture Notes in Computer Science, page 481-486. Springer, (2005)Semantic Representation of RTBAC: Relationship-Based Access Control Model., and . APWeb/WAIM Workshops, volume 4537 of Lecture Notes in Computer Science, page 554-563. Springer, (2007)Supply Chain Management using Multi-agent System., , and . CIA, volume 3191 of Lecture Notes in Computer Science, page 215-225. Springer, (2004)Reorganizing News Web Pages for Mobile Users., , and . EPIA, volume 2902 of Lecture Notes in Computer Science, page 229-243. Springer, (2003)IGC: An Image Genre Classification System., , , , and . AICI (2), volume 7003 of Lecture Notes in Computer Science, page 360-367. Springer, (2011)Database using Personal Information Management System., , , , and . Int. J. Fuzzy Log. Intell. Syst., 8 (4): 260-263 (2008)Artificial Immune System against Viral Attack., , and . International Conference on Computational Science, volume 3037 of Lecture Notes in Computer Science, page 499-506. Springer, (2004)Effective Detector Set Generation and Evolution for Artificial Immune System., , and . International Conference on Computational Science, volume 3037 of Lecture Notes in Computer Science, page 491-498. Springer, (2004)An Effective Method for Location Privacy in Ubiquitous Computing., , and . EUC Workshops, volume 3823 of Lecture Notes in Computer Science, page 1006-1015. Springer, (2005)