Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Analysis of Peer-to-Peer Network Security., and . GCA, page 131-150. CSREA Press, (2005)Design and implementation of transaction level processor based on UVM., , , , and . ASICON, page 1-4. IEEE, (2013)Approaches to Robust Filtering Design of Discrete Time Fuzzy Dynamic Systems., , , and . IEEE Trans. Fuzzy Syst., 16 (2): 331-340 (2008)Parallel-channel flow instabilities and active control schemes in two-phase microchannel heat exchanger systems., , , , , and . ACC, page 3753-3758. IEEE, (2010)Playfield Detection Using Color Ratio and Local Entropy., , , and . IIH-MSP, page 356-359. IEEE Computer Society, (2011)Machine Learning Guided 3D Image Recognition for Carbonate Pore and Mineral Volumes Determination, , , , , and . (2021)cite arxiv:2111.04612Comment: 1- Added Affiliation section. 2- Updated the Acknowledgement section.A design of configurable image enhancement unit., , , , , and . ASICON, page 1-4. IEEE, (2013)A test approach of combining partial scan with functional testing for high performance processors., , , and . ASICON, page 381-384. IEEE, (2011)Research and application of a new predictive control based on state feedback theory in power plant control system., , , and . IEEE Congress on Evolutionary Computation, page 4378-4385. IEEE, (2007)Fuzzy dynamic modeling and predictive load following control of a solid oxide fuel cell power system., , and . FUZZ-IEEE, page 231-237. IEEE, (2008)