Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal staffing strategies for points of dispensing., , , , , , and . Comput. Ind. Eng., (2015)Network Vulnerability Analysis on Brain Signal/Image Databases Using Nmap and Wireshark Tools., , , , , , , , and . IEEE Access, (2018)Design and control of active lower limb prosthesis with sensorial frame., and . J. Syst. Control. Eng., 238 (4): 648-660 (2024)Mathematical Model of HIV/AIDS Considering Sexual Preferences Under Antiretroviral Therapy, a Case Study in San Juan de Pasto, Colombia., , , , , and . J. Comput. Biol., 29 (5): 483-493 (2022)Robust facility location: Hedging against failures., , , , and . Reliab. Eng. Syst. Saf., (2014)Test and Evaluation Framework for Multi-Agent Systems of Autonomous Intelligent Agents., , , , , , , , and . SOSE, page 203-209. IEEE, (2021)Optimal PD Control for Robots Using GAN and LSTM., and . SMC, page 2628-2633. IEEE, (2023)Multi-View Data Augmentation to Improve Wound Segmentation on 3D Surface Model by Deep Learning., , , , , , and . IEEE Access, (2021)Optimal PD Control Using Conditional GAN and Bayesian Inference., , and . IEEE Access, (2024)Are Bitcoin Users Less Sociable? An Analysis of Users' Language and Social Connections on Twitter., , , and . HCI (27), volume 435 of Communications in Computer and Information Science, page 26-31. Springer, (2014)