Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the design of network-processor-based gigabit multiple-service switch., , , , and . ITRE, page 240-244. IEEE, (2005)Video Forgery., , , , and . FGIT, volume 5899 of Lecture Notes in Computer Science, page 7-11. Springer, (2009)From Safety to security - Pattern and anomaly detections in maritime trajectories., , , , and . ICCST, page 415-419. IEEE, (2015)A Scalable Architecture for High Available Security Switches., , , , , , and . ICC, page 2340-2344. IEEE, (2006)3D skeleton construction by multi-view 2D images and 3D model segmentation., , , , and . Int. J. Comput. Sci. Eng., 10 (4): 368-374 (2015)Hydraulic Servocylinder Position Control Using a Hybrid Neurofuzzy Controller., and . J. Intell. Fuzzy Syst., 4 (3): 193-206 (1996)An Automatic Stranger Removal Photography System Using Panoramic Inpainting., , and . J. Inf. Sci. Eng., 31 (6): 1919-1935 (2015)A Coordinate Transformation System Based on the Human Feature Information., , , and . MMM (1), volume 6523 of Lecture Notes in Computer Science, page 514-524. Springer, (2011)A real-time hand gesture recognition system for daily information retrieval from the internet., , , , , and . Int. J. Comput. Sci. Eng., 11 (2): 105-113 (2015)Application of fuzzy control technology on a designed hydraulic DDV., , and . ICNC-FSKD, page 989-994. IEEE, (2016)