Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Attack Detection Approach for IIoT Using Ensemble Classifier., , , , and . CoRR, (2021)On Multi-Step Look-Ahead Deadlock Prediction for Automated Manufacturing Systems Based on Petri Nets., , , , and . IEEE Access, (2020)On the Performance of a Nonlinear Position-Velocity Controller to Stabilize Rotor-Active Magnetic-Bearings System., , , , , and . Symmetry, 13 (11): 2069 (2021)A new methodology for extracting manufacturing features from CAD system., and . Comput. Ind. Eng., 51 (3): 389-415 (2006)A Joint Optimization Model for Transmission Capacity and Wind Power Investment Considering System Security., , , and . IEEE Access, (2023)A Heuristic Angular Clustering Framework for Secured Statistical Data Aggregation in Sensor Networks., , , , , and . Sensors, 20 (17): 4937 (2020)Petri Net Model Based on Neural Network for Deadlock Control and Fault Detection and Treatment in Automated Manufacturing Systems., , , , , , and . IEEE Access, (2020)Deep Learning-Based Transfer Learning for Classification of Skin Cancer., , , , , and . Sensors, 21 (23): 8142 (2021)Product design and development framework in collaborative engineering environment., and . Int. J. Comput. Appl. Technol., 32 (2): 85-94 (2008)A versatile supervisor with one monitor based on macro-tokens., , , , , and . IMA J. Math. Control. Inf., 31 (2): 245-256 (2014)