Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Empower to Shape Change, , , , , , , , and . EmployID Consultancy Network, (2019)Application of conditional entropy measures to steganalysis., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 607204. SPIE, (2006)Interlaboratory comparison of PCR-based identification and genogrouping of Neisseria meningitidis, , , , , , , , , and 12 other author(s). Journal of Clinical Microbiology, 43 (1): 144--149 (January 2005)PMID: 15634963.The Influence of an Individual's Disposition to Value Privacy in a Non-Contrived Study.. Nova Southeastern University, Fort Lauderdale, Florida, USA, (2021)base-search.net (ftnsoutheastern:oai:nsuworks.nova.edu:gscis_etd-2136).Generalized Box-Müller Method for Generating q-Gaussian Random Deviates., , , and . IEEE Trans. Inf. Theory, 53 (12): 4805-4810 (2007)Modulated Rotating Orthogonal Polarization Parametric Imaging, A Preliminary Study., , , , , , , and . MICAD, volume 784 of Lecture Notes in Electrical Engineering, page 108-115. Springer, (2021)Transport optimization on complex networks, , , and . CoRR, (2007)Design of 2 μm Wavelength Polarization Mode Controllers., , , , , and . UCET, page 1-3. IEEE, (2020)Congestion-gradient driven transport on complex networks, , , , , and . CoRR, (2006)Managing financial services marketing. Pitman, London, (1988)