From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cost-sharing mechanisms for network design, , и . Algorithmica, 50 (1): 98--119 (2008)Effective power allocation and distribution for 6 g - network in a box enabled peer to peer wireless communication networks., и . Peer-to-Peer Netw. Appl., 14 (4): 2351-2360 (2021)A Novel Nonisolated Quasi Z-Source Multilevel Inverter for Solar Photovoltaic Energy System Using Robust Technique: An ICSA-RPNN Technique., и . J. Circuits Syst. Comput., 32 (6): 2350104:1-2350104:27 (апреля 2023)A Framework for Human Recognition Based on Locomotive Object Extraction., и . FICTA (2), том 328 из Advances in Intelligent Systems and Computing, стр. 431-439. Springer, (2014)Moving Object Detection by Fuzzy Aggregation Using Low Rank Weightage Representation., и . FICTA (1), том 327 из Advances in Intelligent Systems and Computing, стр. 335-342. Springer, (2014)The Aleph Manual. (2004)Enhancing Grasp Pose Computation in Gripper Workspace Spheres., , , , , и . ICRA, стр. 1539-1545. IEEE, (2020)Secure reputation monitoring system - a novel connected dominating set-based framework for WSNs., , и . Secur. Commun. Networks, 4 (1): 95-108 (2011)Contrasting Function of Structured N-Terminal and Unstructured C-Terminal Segments of Mycobacterium tuberculosis PPE37 Protein, , , , , , , , и . mBio, (января 2018)Steganographic approach to enhancing secure data communication using contours and clustering., , , , , и . Multim. Tools Appl., 77 (24): 32257-32273 (2018)