From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Analysis of Peer-to-Peer Network Security., и . GCA, стр. 131-150. CSREA Press, (2005)Design and implementation of transaction level processor based on UVM., , , , и . ASICON, стр. 1-4. IEEE, (2013)Approaches to Robust Filtering Design of Discrete Time Fuzzy Dynamic Systems., , , и . IEEE Trans. Fuzzy Syst., 16 (2): 331-340 (2008)Parallel-channel flow instabilities and active control schemes in two-phase microchannel heat exchanger systems., , , , , и . ACC, стр. 3753-3758. IEEE, (2010)Playfield Detection Using Color Ratio and Local Entropy., , , и . IIH-MSP, стр. 356-359. IEEE Computer Society, (2011)Machine Learning Guided 3D Image Recognition for Carbonate Pore and Mineral Volumes Determination, , , , , и . (2021)cite arxiv:2111.04612Comment: 1- Added Affiliation section. 2- Updated the Acknowledgement section.A design of configurable image enhancement unit., , , , , и . ASICON, стр. 1-4. IEEE, (2013)A test approach of combining partial scan with functional testing for high performance processors., , , и . ASICON, стр. 381-384. IEEE, (2011)A new image segmentation method via fusing NCut eigenvectors maps., , , , и . ICDIP, том 8334 из SPIE Proceedings, стр. 833430. SPIE, (2012)The Study of Optimizing Model Based on Data Cluster of Information Fusion of Multiple Parameters., и . WKDD, стр. 130-132. IEEE Computer Society, (2009)