

Author: Kim Kyoung-jae
Publisher: Springer Publishing Company
ISSN: 0924-669X
Source: Applied Intelligence, Vol.36, Iss.4, 2012-06, pp. : 887-898
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content






By Ardalani-Farsa Muhammad Zolfaghari Saeed
Cybernetics and Systems, Vol. 44, Iss. 4, 2013-05 ,pp. :

