Author of the publication

A mixed Time-/condition-Based Precognitive Maintenance Framework for Zero-breakdown Industrial Systems.

, , and . Control. Intell. Syst., (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum cryptanalysis on some generalized Feistel schemes., , and . Sci. China Inf. Sci., 62 (2): 22501:1-22501:12 (2019)Impossible differential attack on Simpira v2., , and . Sci. China Inf. Sci., 61 (3): 032106:1-032106:13 (2018)Speech Recognition of English by Japanese Using Lexicon Represented by Multiple Reduced Phoneme Sets., and . IEICE Trans. Inf. Syst., 98-D (12): 2271-2279 (2015)Baseline wander correction in pulse waveforms using wavelet-based cascaded adaptive filter., , , , and . Comput. Biol. Medicine, 37 (5): 716-731 (2007)Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques., , , , and . Secur. Commun. Networks, (2018)A note on BDD problems with λ2-gap., , , and . Inf. Process. Lett., 114 (1-2): 9-12 (2014)Improved Cryptanalysis of the Block Cipher KASUMI., , , , and . Selected Areas in Cryptography, volume 7707 of Lecture Notes in Computer Science, page 222-233. Springer, (2012)Practical Attack on the Full MMB Block Cipher., , , and . Selected Areas in Cryptography, volume 7118 of Lecture Notes in Computer Science, page 185-199. Springer, (2011)Active Control of Configuration-Dependent Linkage Vibration with Application to a Planar Parallel Platform., and . ICRA, page 4327-4332. IEEE, (2005)Improved Single-Key Attacks on 9-Round AES-192/256., , and . FSE, volume 8540 of Lecture Notes in Computer Science, page 127-146. Springer, (2014)