Author of the publication

Conditional Log-linear Structures for Log-linear Modelling.

. Modelling, Identification and Control, page 477-482. IASTED/ACTA Press, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-voltage input power supply for modular multi-level converter., , and . AIM, page 1690-1693. IEEE, (2015)Analysis on time-delay of commercial off-the-shelf vision system considering motion-blur., and . IROS, page 2080-2085. IEEE, (2001)Development of heat generating system based on small wind turbine system., , and . SCIS&ISIS, page 1209-1212. IEEE, (2014)Conditional Log-linear Structures for Log-linear Modelling.. Modelling, Identification and Control, page 477-482. IASTED/ACTA Press, (2003)Performance Analysis of MAC Protocol for EPON Using OPNET., , , and . Human.Society@Internet 2003, volume 2713 of Lecture Notes in Computer Science, page 656-661. Springer, (2003)DDoS attack detection by using packet sampling and flow features., , and . SAC, page 711-712. ACM, (2014)Application of Neural Inverse Modeling Scheme to Optimal Parameter Tuning of Filter Test Equipment., , and . Int. J. Fuzzy Log. Intell. Syst., 4 (2): 172-175 (2004)Real-Time Forensic Marking Method based on Tiles Parallel Processing., , , and . ICTC, page 1475-1477. IEEE, (2020)DDoS flooding attack detection through a step-by-step investigation., , and . NESEA, page 1-5. IEEE Computer Society, (2011)A Method of Object Recognition which Applicable to the Real-Time Processing Using Adaptive Factors., , , , and . MUE, page 686-691. IEEE Computer Society, (2007)