Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neuro-fuzzy techniques for airborne target tracking., , , and . KES (2), page 251-257. IEEE, (1998)Analysis and simulation of reliability of wireless sensor network based on node optimization deployment model., , and . Clust. Comput., 22 (Supplement): 7585-7591 (2019)Automatically Constructing Peer Slices via Semanticand Context-Aware Security Checks in the Linux Kernel., , , and . DSN Workshops, page 108-113. IEEE, (2021)2-D DOA estimation with virtual sensors., and . DSP, page 953-956. IEEE, (2015)Finding Missing Security Operation Bugs via Program Slicing and Differential Check., , , , , , and . ICICS, volume 14252 of Lecture Notes in Computer Science, page 702-718. Springer, (2023)Integrative computing method for the prediction of zinc-binding sites in proteins., , , , and . IJCNN, page 3259-3264. IEEE, (2017)Tensor alternating least squares grey model and its application to short-term traffic flows., , , and . Appl. Soft Comput., (2020)Urban Flood Risk Assessment through the Integration of Natural and Human Resilience Based on Machine Learning Models., , , , and . Remote. Sens., 15 (14): 3678 (July 2023)Ultrasound-Based 3-D Gesture Recognition: Signal Optimization, Trajectory, and Feature Classification., , , , and . IEEE Trans. Instrum. Meas., (2023)The cospectral equivalence classes of graphs having an isolated vertex., , , , and . Comput. Math. Appl., 57 (10): 1638-1644 (2009)