Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The effectiveness of image features based on fractal image coding for image annotation., , , and . Expert Syst. Appl., 39 (17): 12897-12904 (2012)A user's personality prediction approach by mining network interaction behaviors on Facebook., , and . Online Inf. Rev., 40 (7): 913-937 (2016)Ontology-based SWOT analysis method for electronic word-of-mouth., , , and . Knowl. Based Syst., (2013)Mining Location-Based Service Data for Feature Construction in Retail Store Recommendation., , and . ICDM, volume 10357 of Lecture Notes in Computer Science, page 68-77. Springer, (2017)An Efficient Pruning and Filtering Strategy to Mine Partial Periodic Patterns from a Sequence of Event Sets., , , and . IJDWM, 10 (2): 18-38 (2014)Fraud detection for financial statements of business groups., , , and . Int. J. Account. Inf. Syst., (2019)Enhancement of fraud detection for narratives in annual reports., , , , and . Int. J. Account. Inf. Syst., (2017)Erratum to Ä fuzzy trust evaluation method for knowledge sharing in virtual enterprises" Computers & Industrial Engineering 59 (2010) 853-864., , , and . Comput. Ind. Eng., 60 (4): 872 (2011)Developing a personal value analysis method of social media to support customer segmentation and business model innovation., , and . Expert Syst. J. Knowl. Eng., (2019)A Formal Virtual Enterprise Access Control Model., , and . IEEE Trans. Syst. Man Cybern. Part A, 38 (4): 832-851 (2008)