Author of the publication

Study on the communication method for chaotic encryption in remote monitoring systems.

, , , , , and . Soft Comput., 10 (3): 224-229 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Applying Viewshed Analysis for Determining Least-Cost Paths on Digital Elevation Models., and . International Journal of Geographical Information Science, 12 (8): 891-905 (1998)Agents enabling cyber-physical production systems., , and . Automatisierungstechnik, 63 (10): 777-789 (2015)Kinematic synthesis of industrial robot hand/gripper - a creative design approach.. Robotics and Autonomous Systems, 4 (3): 257-263 (1988)Impact of Spatial Filtering on the Least Cost Path Method: Selecting a High-Speed Rail Route for Ohio's 3-C Corridor., , , , and . IJAGR, 1 (4): 32-44 (2010)Internet server controller based intelligent maintenance system for information appliance products., , , and . KES Journal, 9 (2): 137-148 (2005)Guest Editorial Special Section on Smart Agents and Cyber-Physical Systems for Future Industrial Systems., , and . IEEE Trans. Industrial Informatics, 13 (2): 657-659 (2017)Exploring spatiotemporal clusters based on extended kernel estimation methods., , and . International Journal of Geographical Information Science, 31 (6): 1154-1177 (2017)Production line simulation using STPN for maintenance scheduling., , , and . J. Intelligent Manufacturing, 21 (2): 213-221 (2010)Editorial., and . Advanced Engineering Informatics, 17 (3-4): 107 (2003)Feature extraction and damage-precursors for prognostication of lead-free electronics., , , , , and . Microelectronics Reliability, 47 (12): 1907-1920 (2007)