Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated road extraction using reinforced road indices for Sentinel-2 data., , and . Array, (2022)Coordinated voltage control strategy for voltage regulators and voltage source converters integrated distribution system., , , , and . IAS, page 1-8. IEEE, (2017)Operational cost value assessment and value based stacked energy storage management for active power distribution systems., , , , and . IAS, page 1-8. IEEE, (2017)Formalization of Transform Methods in Higher-order Logic: A Survey (short paper)., and . CICM Workshops, volume 3377 of CEUR Workshop Proceedings, CEUR-WS.org, (2021)Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks., , and . ICA3PP (1), volume 7439 of Lecture Notes in Computer Science, page 16-29. Springer, (2012)Permutation-Aware Activity Segmentation via Unsupervised Frame-to-Segment Alignment., , , , , , and . WACV, page 6412-6422. IEEE, (2024)A novel approach to investigate the stability analysis and the dynamics of reaction-diffusion SVIR epidemic model., , and . Commun. Nonlinear Sci. Numer. Simul., (November 2023)A numerical investigation of the quadratic numerical range of Hain-Lüst operators., and . Int. J. Comput. Math., 90 (11): 2431-2451 (2013)An Approach For Net-Load Management To Reduce Intermittency And Smooth The Power Output On Distribution Feeders With High PV Penetration., and . IAS, page 1-9. IEEE, (2018)Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network., , and . NPC, volume 7513 of Lecture Notes in Computer Science, page 94-100. Springer, (2012)