

Author: Niknam Taher
Publisher: Taylor & Francis Ltd
ISSN: 1087-6553
Source: Cybernetics and Systems, Vol.40, Iss.6, 2009-08, pp. : 508-527
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










By Ma Changxi Li Yinzhen He Ruichun Wu Fang Sun Li Qi Bo
International Journal of Computer Applications in Technology, Vol. 46, Iss. 3, 2013-03 ,pp. :