From post

Construction and Evaluation of the Five-in-One Practice Teaching Model.

, , , , и . ICCSE (3), том 2025 из Communications in Computer and Information Science, стр. 51-61. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Road recognition and motion target tracking based on infrared image., , и . Int. J. Wirel. Mob. Comput., 20 (2): 107-119 (2021)Research of Coal Mine Safety-Production Dispatching Based on Multilayer Petri Net., и . FSKD (2), стр. 332-337. IEEE Computer Society, (2009)Research and Application of Reinforcement Learning Based on Constraint MDP in Coal Mine., , , и . CSIE (4), стр. 687-691. IEEE Computer Society, (2009)Lip-Reading Based on Deep Learning Model., , и . Trans. Edutainment, (2019)DRETOM: developer recommendation based on topic models for bug resolution., , , и . PROMISE, стр. 19-28. ACM, (2012)Third International Workshop on Conceptual Modelling of Services (CMS 2012)., и . ER Workshops, том 7518 из Lecture Notes in Computer Science, стр. 1-2. Springer, (2012)An Empirically-Based Process to Improve the Practice of Requirement Review., , , , и . ICSP, том 5007 из Lecture Notes in Computer Science, стр. 135-146. Springer, (2008)A Vulnerability Attack Graph Generation Method Based on Scripts., , , и . ICICA (LNCS), том 7473 из Lecture Notes in Computer Science, стр. 45-50. Springer, (2012)Research on Evaluation of Parallelization on an Embedded Multicore Platform., , , , и . APPT, том 5737 из Lecture Notes in Computer Science, стр. 330-340. Springer, (2009)PriGen: A Generic Framework to Preserve Privacy of Healthcare Data in the Cloud., , , и . ICOST, том 7910 из Lecture Notes in Computer Science, стр. 77-85. Springer, (2013)