Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Integrative System for Deep Packet Inspection and Network Anomaly Detection amp; Defense, , , , and . Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on, page 1-4. (2011)Multi-scale block local ternary patterns for fingerprints vitality detection., , , , , , and . ICB, page 1-6. IEEE, (2013)Constrained quantization algorithm for color images., , and . ICIP (1), page 910-913. IEEE, (2001)QoS Routing for MANET and Satellite Hybrid Network to Support Disaster Relives and Management., , , and . VTC Spring, page 1-5. IEEE, (2016)Autonomous ground vehicle navigation method in complex environment., , , , and . Intelligent Vehicles Symposium, page 1060-1065. IEEE, (2010)Stability metric based routing protocol for low-power and lossy networks., , , , and . ICC, page 3688-3693. IEEE, (2014)A new access control method for semantic web services based on security control center., , and . ICNC, page 3711-3714. IEEE, (2010)Automatic face detection system for street view images., and . ROBIO, page 2260-2263. IEEE, (2012)Estimating Subsurface Thermohaline Structure of the Global Ocean Using Surface Remote Sensing Observations., , , and . Remote Sensing, 11 (13): 1598 (2019)Topology authentication for piping isometric drawings., , , , and . Comput. Aided Des., (2015)