Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development of an Autonomous UAV Integrated with a Manipulator and a Soft Gripper., , , , , , and . ASCC, page 2212-2217. IEEE, (2022)3D Pure Pursuit Guidance of Drones for Autonomous Precision Landing., , , , , , , and . ASCC, page 2218-2222. IEEE, (2022)Aeromechanical Design and Analysis of H-Drone Configuration., , , , , , , , and . ASCC, page 2223-2228. IEEE, (2022)Modelling nutrient transfer based on 3D imaging of the human placental microstructure., , and . EMBC, page 5953-5956. IEEE, (2016)Detecting Targeted Malicious Email., , and . IEEE Secur. Priv., 10 (3): 64-71 (2012)Automated 3D Labelling of Fibroblasts and Endothelial Cells in SEM-Imaged Placenta using Deep Learning., , , , , , , , , and . BIOIMAGING, page 46-53. SCITEPRESS, (2020)Distributed Estimation of an Uncertain Environment using Belief Consensus and Measurement Sharing., and . SMC, page 1362-1367. IEEE, (2020)CoviRx: A User-Friendly Interface for Systematic Down-Selection of Repurposed Drug Candidates for COVID-19., , , , , , , , , and 10 other author(s). Data, 7 (11): 164 (2022)Genetic Algorithms and Neural Networks in the Molecular Design of Novel Fibers., , and . DEXA Workshops, page 598-602. IEEE Computer Society, (2006)Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains, , and . Leading Issues in Information Warfare & Security Research, (2011)