Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy inference to supplier evaluation and selection based on quality index: a flexible approach., , and . Neural Comput. Appl., 23 (Supplement-1): 117-127 (2013)Evaluation of the reliability of transport networks based on the stochastic flow of moving objects., , and . Reliab. Eng. Syst. Saf., 93 (6): 838-844 (2008)Evaluation of the Reliability of Emergency Networks under Time Constraints., and . CASE, page 259-263. IEEE, (2006)Design of a coherent inverse synthetic aperture radar moving target simulator., , , , and . IEICE Electron. Express, 11 (24): 20141044 (2014)An ultra-high ramp rate arbitrary waveform generator for communication and radar applications., , , , , and . IEICE Electron. Express, 12 (3): 20141163 (2015)Robust secrecy beamforming for wireless information and power transfer in multiuser MISO communication system., and . EURASIP J. Wireless Comm. and Networking, (2015)A New Training Algorithm for a Fuzzy Perceptron and Its Convergence., , and . ISNN (1), volume 3496 of Lecture Notes in Computer Science, page 609-614. Springer, (2005)Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach., , , and . ProvSec, volume 9451 of Lecture Notes in Computer Science, page 215-226. Springer, (2015)Uniform Approximation Capabilities of Sum-of-Product and Sigma-Pi-Sigma Neural Networks., , and . ISNN (1), volume 4491 of Lecture Notes in Computer Science, page 1110-1116. Springer, (2007)A Bottom-Up OCR System for Mathematical Formulas Recognition., , , , and . ICIC (1), volume 4113 of Lecture Notes in Computer Science, page 274-279. Springer, (2006)