From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting Malware in Malicious Virtual Machines Using Tensor Analysis Techniques., , , и . ICS, том 274 из Frontiers in Artificial Intelligence and Applications, стр. 821-830. IOS Press, (2014)A TSK-type fuzzy neural network (TFNN) systems for dynamic systems identification., , и . CDC, стр. 4002-4007. IEEE, (2003)Information Exchange Mechanism Based on Reputation in Mobile P2P Networks., , , , и . IIH-MSP, стр. 643-646. IEEE Computer Society, (2007)Novel Efficient Electronic Voting Mechanism Based upon Elliptic Curve., , и . IIH-MSP, стр. 898-901. IEEE Computer Society, (2009)Wireless Charging Deployment in Sensor Networks., и . Sensors, 19 (1): 201 (2019)A surface defect detection system for golden diamond pineapple based on CycleGAN and YOLOv4., , , , , , , и . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part A): 8041-8053 (2022)Deploying base stations for simple user traces in mobile networks., , и . ISPACS, стр. 164-169. IEEE, (2015)Iterative Interference Suppression for High-Rate Single-Carrier Space-Time Block-Coded CDMA., , и . ICC, стр. 4087-4092. IEEE, (2007)Continuous Terrain Guarding with Two-Sided Guards., и . CCCG, стр. 247-252. (2018)Bit-Interleaved Coded Modulation with Iterative Interference Suppression for Multi-Sequence Signaling Based MC-CDMA., , и . VTC Spring, стр. 2093-2097. IEEE, (2006)