Author of the publication

Reverse engineering resistant ROM design using transformable via-programming structure.

, and . ISCAS, page 2627-2630. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lowering systolic blood pressure to less than 120 mm Hg versus less than 140 mm Hg in patients with high cardiovascular risk with and without diabetes or previous stroke: an open-label, blinded-outcome, randomised trial, , , , , , , , , and 736 other author(s). (2024)A Global Convergence Algorithm for the Supply Chain Network Equilibrium Model. International Journal of Advanced Computer Science and Applications(IJACSA), (2012)Modeling and Robustness Analysis of Biochemical Networks of Glycerol Metabolism by Klebsiella Pneumoniae., , , , and . Complex (1), volume 4 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 446-457. Springer, (2009)Adaptive tracking channel control for GNSS receivers under renewable energy., and . ISQED, page 212-216. IEEE, (2015)Pre-impact & impact detection of falls using wireless Body Sensor Network., , , and . BHI, page 763-766. IEEE, (2012)Experimental result on wireless power management microsystem for endoscopic capsule robot., , and . BHI, page 810-813. IEEE, (2012)Why Do IS Scholars Cite Other Scholars? An Empirical Analysis of the Direct and Moderating Effects of Cooperation and Competition among IS Scholars on Individual Citation Behavior., , and . ICIS, Association for Information Systems, (2014)Image compression algorithm based on automatic extracted ROI., , and . FSKD, page 788-792. IEEE, (2014)The Experimental Study on Ozone to Remove NO by DBD., , , and . CSISE (2), volume 105 of Advances in Intelligent and Soft Computing, page 453-458. Springer, (2011)The experiments and analysis of several selective video encryption methods., , and . ICDIP, volume 8878 of SPIE Proceedings, page 88781M. SPIE, (2013)