Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Longzhi Yang (FBCS, SMIEEE, SFHEA)Professor of Computer Science and AI, Director of Education, Department of Computer and InformationEmail verificata su northumbria.ac.uk
- Fei ChaoAssociate Professor, Department of Artificial Intelligence, Xiamen UniversityEmail verificata su xmu.edu.cn
- Nitin NaikAston University, School of Informatics and Digital Engineering, United KingdomEmail verificata su aston.ac.uk
- Neil EliotNorthumbria universityEmail verificata su eliot.org.uk
- Jie LiSenior Lecturer in Cybersecurity and Networks, Teesside UniversityEmail verificata su tees.ac.uk
- Tom PrickettNorthumbria UniversityEmail verificata su northumbria.ac.uk
- Honglei LiAssitant Professor of Enterprise Information Systems, Northumbria UniversityEmail verificata su northumbria.ac.uk
- Zheming ZuoResearch Associate, School of Computing, Newcastle UniversityEmail verificata su newcastle.ac.uk
- Tossapon BoongoenDepartment of Computer Science, Aberystwyth UniversityEmail verificata su aber.ac.uk
- Dr. Jabhera MatogoroDepartment of Computer Science and Engineering, University of DodomaEmail verificata su udom.ac.tz
- Ramadhani S. SindeNelson Mandela African Institution of Science and TechnologyEmail verificata su nm-aist.ac.tz
- Dr. Tabu S. KondoLecturer, Department of Computer Science and Engineering, The University of DodomaEmail verificata su udom.ac.tz
- Ing. Judith Leo (Ph.D)Lecturer cum Researcher in Artificial IntelligenceEmail verificata su nm-aist.ac.tz
- Salim DiwaniThe University of DodomaEmail verificata su udom.ac.tz
- Thabiso Peter MpofuHarare Institute of TechnologyEmail verificata su hit.ac.zw