From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure and verifiable outsourcing protocol for non-negative matrix factorisation., , и . IJHPCN, 11 (1): 14-23 (2018)WiFi based communication and localization of an autonomous mobile robot for refinery inspection., , , , , и . ICRA, стр. 4490-4495. IEEE, (2015)A data collection protocol for real-time sensor applications., и . Pervasive Mob. Comput., 5 (4): 369-384 (2009)Multipoint communications with speech mixing over IP network., , , и . Comput. Commun., 25 (1): 46-55 (2002)Dual Watermarking for Image Tamper Detection and Self-Recovery., , , и . IIH-MSP, стр. 33-36. IEEE, (2013)Modeling and simulation of practical quantum secure communication network., , , и . Quantum Inf. Process., 18 (9): 278 (2019)An Improved Biometric Template Protection Method based on Non-Uniform Quantization., , и . J. Digit. Inf. Manag., 6 (2): 168-173 (2008)Stabilization of Delayed Chaotic Neural Networks by Periodically Intermittent Control., , и . Circuits Syst. Signal Process., 28 (4): 567-579 (2009)Cluster lag synchronization of delayed heterogeneous complex dynamical networks via intermittent pinning control., , , , и . Neural Comput. Appl., 31 (11): 7945-7961 (2019)Finite-time average consensus of directed second-order multi-agent systems with Markovian switching topology and impulsive disturbance., , и . Neural Comput. Appl., 35 (11): 8575-8588 (апреля 2023)