Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure SCADA Communications, Monitoring and Control over the Internet., , , and . CAINE, page 169-174. ISCA, (2005)Using SQL to query the difficulty imposed by spaced retrieval in engineering mathematics., , , , , and . FIE, page 1-4. IEEE, (2021)Research to Practice to Research: Intrinsic requirements of implementing and studying spaced retrieval practice in STEM courses., , , and . FIE, page 1-5. IEEE, (2020)Retrieval practice and spacing in an engineering mathematics classroom: Do the effects add up?, , , and . FIE, page 1-5. IEEE Computer Society, (2017)Linguistic Design of Nonlinear Controllers., , and . J. Intell. Fuzzy Syst., 4 (1): 19-32 (1996)ITONUS: Expert system for machining on a lathe., , , and . J. Intell. Manuf., 2 (6): 353-363 (1991)Analysis of population size in the accuracy and performance of genetic training for rule-based control systems., and . Comput. Oper. Res., 22 (1): 65-71 (1995)Intelligent Computer-Based Monitoring and Fault Isolation for Industrial Processes., and . Int. J. Comput. Their Appl., 9 (3): 147-157 (2002)Testing Security Enhanced SCADA Communication Protocols., , and . CAINE, page 103-108. ISCA, (2007)Computer-based monitoring and fault diagnosis for chemical processes., and . CATA, page 309-312. ISCA, (2000)