From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identification of Manual Alphabets Based Gestures Using s-EMG for Realizing User Authentication., , , , , , и . EIDWT, том 47 из Lecture Notes on Data Engineering and Communications Technologies, стр. 323-333. Springer, (2020)Implementation of Tamias to Check Production Rules for Parsing Expression Grammar., , , , , и . JRNAL, 6 (2): 123-127 (2019)Combinatorial Test Architecture Design Using Viewpoint Diagram., , и . ICST Workshops, стр. 295-300. IEEE Computer Society, (2013)Demonstration of All-Optical Ultrafast Switching, Using High-Quality Graphene., , , , , , и . OECC/PSC, стр. 1-3. IEEE, (2022)Prototype of an Automatic Visualization Tool for Java to Educate Novice Programmers., , и . IASTED Conf. on Software Engineering, стр. 307-312. IASTED/ACTA Press, (2005)Evaluation of User Identification Methods for Realizing an Authentication System Using s-EMG., , , , и . NBiS, том 22 из Lecture Notes on Data Engineering and Communications Technologies, стр. 733-742. Springer, (2018)Analysis of Self Determination Factors for Continuance Intention on Online Learning Management System., , , , , , и . J. Robotics Netw. Artif. Life, 10 (1): 91-95 (2023)Interactive Video CAPTCHA for Better Resistance to Automated Attack., , , , , , и . ICMU, стр. 1-2. IEEE, (2018)Implementation of Arduino Simulator ADVIS Visualizing the Value of Voltage on the Circuit., , , , , и . JRNAL, 5 (4): 249-252 (2019)Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files., , , , , , , и . NBiS, том 1036 из Advances in Intelligent Systems and Computing, стр. 305-316. Springer, (2019)