Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social Engineering for Security Attacks., , , , and . MISNC, page 6. ACM, (2016)Multiview Image Coding Based on Geometric Prediction., , , and . IEEE Trans. Circuits Syst. Video Techn., 17 (11): 1536-1548 (2007)Special Section on Interactive Multimedia., , , and . IEEE Trans. Multimedia, 13 (5): 841-843 (2011)Computation of Lyapunov values for two planar polynomial differential systems., , , and . Applied Mathematics and Computation, 204 (1): 240-248 (2008)Optimal layout and path planning for flame cutting of sheet metals., , , and . Int. J. Computer Integrated Manufacturing, 22 (1): 30-41 (2009)Particle Filter with Operational-Scalable Takagi-Sugeno Fuzzy Degradation Model for Filter-Clogging Prognosis., , and . J. Aerospace Inf. Sys., 12 (5): 398-412 (2015)Spatial interpolation of McArthur's Forest Fire Danger Index across Australia: Observational study., , , , and . Environmental Modelling and Software, (2013)Instructions Micromachined Tunable Filter Via Actuation Of Fabry-Parot Cavity., , , , and . International Journal of Computational Engineering Science, 4 (3): 451-454 (2003)Investigation Of Loading Effect In Deep Trench Lisa Technology., , , and . International Journal of Computational Engineering Science, 4 (2): 303-306 (2003)Characterisation of dynamic properties of coating-substrate system by molecular dynamics simulation., , , and . IJCAT, 29 (2/3/4): 108-113 (2007)