Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method for Defect Delineation in Silicon Carbide Using Potassium Hydroxide Vapor, , , , , , and . Jpn. J. Appl. Phys., 41 (12): 7312--7316 (2002)Reduced Complexity Architecture for Convolution Based Discrete Cosine Transform., , , and . ISED, page 67-71. IEEE Computer Society, (2013)A Naïve-Bayesian Methodology to Classify Echo Cardiographic Images through SQL., , , , and . KICSS, volume 6746 of Lecture Notes in Computer Science, page 155-165. Springer, (2010)Energy Efficient Cache Node Placement Using Genetic Algorithm with Probabilistic Delta Consistency Using Flexible Combination of Push and Pull Algorithm for Wireless Sensor Networks., and . SOFA (1), volume 633 of Advances in Intelligent Systems and Computing, page 143-163. Springer, (2016)Performance of Artificial Intelligence Applications on Embedded Parallel Platforms Using Python as the Language Tool., and . SOFA, volume 1438 of Advances in Intelligent Systems and Computing, page 409-425. Springer, (2020)Fuzzy Logic Approach for Replacement Policy in Web Caching., , , and . IICAI, page 2308-2319. IICAI, (2005)Deep Facial Emotion Recognition System Under Facial Mask Occlusion., , and . CVIP (2), volume 1377 of Communications in Computer and Information Science, page 381-393. Springer, (2020)Control of a Compass Gait Biped Robot Based on Partial Feedback Linearization., , and . TAROS, volume 7429 of Lecture Notes in Computer Science, page 117-127. Springer, (2012)Multi-view Robotic Time Series Data Clustering and Analysis Using Data Mining Techniques., , , , and . SIRS, volume 425 of Advances in Intelligent Systems and Computing, page 521-531. Springer, (2015)DRIL- A Flexible Architecture for Blowfish Encryption Using Dynamic Reconfiguration, Replication, Inner-Loop Pipelining, Loop Folding Techniques., , and . Asia-Pacific Computer Systems Architecture Conference, volume 3740 of Lecture Notes in Computer Science, page 625-639. Springer, (2005)