From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Malware Variants Detection Using Behavior Destructive Features., , , и . PAC, стр. 121-122. IEEE, (2018)Reader planning in UHF RFID application., и . RFID-TA, стр. 272-278. IEEE, (2011)Integrated system for image storage, retrieval, and transmission using wavelet transform., , , и . Storage and Retrieval for Image and Video Databases (SPIE), том 3656 из SPIE Proceedings, стр. 448-457. SPIE, (1999)Efficient and Load Balancing Strategy for Task Scheduling in Spatial Crowdsourcing., , и . WAIM Workshops, том 9998 из Lecture Notes in Computer Science, стр. 161-173. (2016)Transparent information hiding with automatic embedding range selection for ownership verification., , , и . ICIP, стр. 2657-2660. IEEE, (2004)New approach to multihop - cellular based multihop network., , и . PIMRC, стр. 1629-1633. IEEE, (2003)Segmented Cyclic Redundancy Check: A Data Protection Scheme for Fast Reading RFID Tag's Memory., , , , и . WCNC, стр. 1576-1581. IEEE, (2008)A Method of Analysis and Verification for Safety-Critical Software Based on Modelling and Testing., и . SSIRI (Companion), стр. 3-4. IEEE Computer Society, (2011)Research on UUV Obstacle Avoiding Method Based on Recurrent Neural Networks., , , , и . Complex., (2019)Monitoring the Weibull Scale Parameter Based on Type I Censored Data Using a Modified EWMA Control Chart., , , , , и . Axioms, 12 (5): 487 (мая 2023)