From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure., , и . ICCSA (4), том 3983 из Lecture Notes in Computer Science, стр. 296-305. Springer, (2006)Two Phase Reverse Neural Network Based Human Vital Sign Prediction System., , и . CIMCA/IAWTIC, стр. 135. IEEE Computer Society, (2006)PLC Control Logic Error Monitoring and Prediction Using Neural Network., , , , , , , , , и . ICNC (2), стр. 484-488. IEEE Computer Society, (2008)3D Range Image Simplification., и . ICDIP, стр. 270-274. IEEE Computer Society, (2009)Development of Virtual Simulator for Visual Validation of PLC Program., , , , , и . CIMCA/IAWTIC, стр. 32. IEEE Computer Society, (2006)Timed-MPSG: A Formal Model for Real-Time Shop Floor Controller., , , и . CIMCA/IAWTIC, стр. 101. IEEE Computer Society, (2006)A State-of-the-Art Review of Artificial Bee Colony in the Optimization of Single and Multiple Criteria., , и . Int. J. Appl. Metaheuristic Comput., 4 (4): 23-45 (2013)Modeling, verification, and implementation of PLC program using timed-MPSG., , , и . SCSC, стр. 533-540. Simulation Councils, Inc., (2007)Symbol Naming Rules For Plant Model Generation In The PLC Simulation., , и . ECMS, стр. 403-408. European Council for Modeling and Simulation, (2009)Seed Point Detection of Multiple Cancers Based on Empirical Domain Knowledge and K-means in Ultrasound Breast Image., , , , и . AICI, том 5855 из Lecture Notes in Computer Science, стр. 507-516. Springer, (2009)