Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Indoor Collaborative Coefficient-Triangle APIT Localization Algorithm., , , , and . Algorithms, 10 (4): 131 (2017)Rational Time-frequency Vector-Valued Subspace Gabor Frames and Balian-Low Theorem., and . IJWMIP, (2013)A secure, service priority-based incentive scheme for delay tolerant networks., and . Security and Communication Networks, 9 (1): 5-18 (2016)Effectiveness Assessment on Urban Planning Analyzed in Virtual Reality Environments., , and . JSW, 8 (1): 78-84 (2013)TCP over OBS: Impact of consecutive multiple packet losses and improvements., , and . Photonic Network Communications, 16 (3): 203-220 (2008)Two-dimensional electrical modeling of thermoelectric devices considering temperature-dependent parameters under the condition of nonuniform substrate temperature distribution., , , , , , , and . Microelectronics Journal, 44 (3): 270-276 (2013)Inertial sensors supported visual descriptors encoding and geometric verification for mobile visual location recognition applications., , , , , and . Signal Processing, (2015)Robust digital watermarking in PDTDFB domain based on least squares support vector machine., , , and . Eng. Appl. of AI, 26 (9): 2058-2072 (2013)Robust digital watermarking based on local invariant radial harmonic fourier moments., , , , , and . Multimedia Tools Appl., 74 (23): 10559-10579 (2015)Delegatable Authorization Program and Its Application., , and . Security and Management, page 267-273. CSREA Press, (2003)