Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Image-Based Pencil Sketch Rendering., , , , and . J. Comput. Sci. Technol., 17 (3): 347-355 (2002)Routing for cognitive radio networks consisting of opportunistic links., , , , , and . Wireless Communications and Mobile Computing, 10 (4): 451-466 (2010)Inference and learning methodology of belief-rule-based expert system for pipeline leak detection., , , , , , and . Expert Syst. Appl., 32 (1): 103-113 (2007)Application of MADM in a fuzzy environment for selecting the best barrier for offshore wells., , , and . Expert Syst. Appl., 39 (3): 2466-2478 (2012)The application of the Six Sigma concept to port security process quality control., , , , and . Quality and Reliability Eng. Int., 23 (5): 631-639 (2007)Research of an architecture of operating system kernel based on modularity concept., , , , , , and . Mathematical and Computer Modelling, 51 (11-12): 1421-1427 (2010)HTTP-SoLDiER: An HTTP-flooding attack detection scheme with the large deviation principle., , , , and . SCIENCE CHINA Information Sciences, 57 (10): 1-15 (2014)Robustness and energy efficiency - a logical multi-topology scheme for time-varying traffic in IP networks., , and . IET Networks, 4 (3): 169-174 (2015)Discussion on: "Closed-Loop Identification of MIMO Systems: A New Look at Identifiability and Experiment Design".. Eur. J. Control, 16 (3): 240-241 (2010)Iterative second-order derivative-based deinterlacing algorithm., , and . Sig. Proc.: Image Comm., 28 (5): 472-482 (2013)