Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An LMI approach to design robust fault detection filter for uncertain LTI systems., , , and . Automatica, 39 (3): 543-550 (2003)Robust airplane detection in satellite images., , , and . ICIP, page 2821-2824. IEEE, (2011)Maximum correntropy criterion based 3D head tracking with commodity depth camera., , , , and . ICIP, page 2782-2786. IEEE, (2013)Theorems Supporting r-flip Search for Pseudo-Boolean Optimization., , and . Int. J. of Applied Metaheuristic Computing, 1 (1): 93-109 (2010)Adaptive Modulation for a Downlink Multicast Channel in OFDMA systems., , and . WCNC, page 650-655. IEEE, (2007)Skin detection via linear regression tree., , , and . ICPR, page 1711-1714. IEEE Computer Society, (2012)An accelerated successive approximation technique for analog to digital converter design., and . SoCC, page 236-241. IEEE, (2014)A Computational Study for Feature Selection on Customer Credit Evaluation., , , and . SMC, page 2973-2978. IEEE, (2013)Hybrid pattern matching for trusted intrusion detection., , , and . Security and Communication Networks, 4 (1): 33-43 (2011)An Algorithm of Extracting Intracranial Structures from Cerebral Computed Tomography., and . CSSE (6), page 440-443. IEEE Computer Society, (2008)978-0-7695-3336-0.