From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Risk assessment method for cybersecurity of cyber-physical systems based on inter-dependency of vulnerabilities., , и . IEEM, стр. 1618-1622. IEEE, (2015)Design and Control of a Piezoelectric Actuated Prostate Intervention Robotic System*., , , , , и . UR, стр. 175-180. IEEE, (2020)Load Analysis and Research of Planetary Roller Screw considering Tooth Angle error., и . ICCIR, стр. 64-68. ACM, (2022)Methods to monitor process's Spatial and temporal consumption., , и . FSKD, стр. 892-897. IEEE, (2014)Copy-move forgery detection based on multi-radius PCET., , , , и . IET Image Processing, 11 (2): 99-108 (2017)Improvement of Low-Speed Precision Control of a Butterfly-Shaped Linear Ultrasonic Motor., , , и . IEEE Access, (2020)Adaptive Object Position Detection System Based On Global Vision., , , , , , и . RCAR, стр. 947-952. IEEE, (2023)Research on improving fairness of Linux scheduler., , , и . ICIA, стр. 409-414. IEEE, (2013)Vision-Based Target Objects Recognition and Segmentation for Unmanned Systems Task Allocation., , , и . ICIAR (1), том 11662 из Lecture Notes in Computer Science, стр. 252-263. Springer, (2019)Algorithm design and performance evaluation of sparse induced suffix sorting., и . Inf. Process. Manag., 61 (5): 103777 (2024)