Author of the publication

Stability analysis of discrete-time fuzzy positive systems with time delays.

, , and . Journal of Intelligent and Fuzzy Systems, 25 (4): 893-905 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating a statistical background- foreground extraction algorithm and SVM classifier for pedestrian detection and tracking., , , , and . Integrated Computer-Aided Engineering, 20 (3): 201-216 (2013)Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation., , , and . Security and Communication Networks, 8 (18): 3356-3371 (2015)Neighborhood discriminant projection for face recognition., , , and . Pattern Recognition Letters, 28 (10): 1156-1163 (2007)Approximation of Circular Arcs by C2 Cubic Polynomial B-splines., and . CAD/Graphics, page 417-420. IEEE, (2007)Locality-Constrained Collaborative Sparse Approximation for Multiple-Shot Person Re-identification., , and . ACPR, page 140-144. IEEE, (2013)Optimizing Mean Reciprocal Rank for person re-identification., , , , and . AVSS, page 408-413. IEEE Computer Society, (2011)Can feature-based inductive transfer learning help person re-identification?, , , and . ICIP, page 2812-2816. IEEE, (2013)Pedestrian detection using background subtraction assisted Support Vector Machine., , , and . ISDA, page 837-842. IEEE, (2011)Practical Quantum No-key Protocol with Identification., and . IAS, page 540-543. IEEE Computer Society, (2009)An Improved Network Intrusion Detection Method based on VQ-SVM., , and . IASTED PDCS, page 583-587. IASTED/ACTA Press, (2005)