Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Elimination beam-forming in downlink multi-user MIMO systems., , , and . IWCMC, page 1062-1067. IEEE, (2015)Writer Identification of Arabic Text using Statistical and Structural Features., and . Cybernetics and Systems, 44 (1): 57-76 (2013)A new genetic-based technique for matching 3-D curves and surfaces., , and . Pattern Recognition, 32 (10): 1817-1820 (1999)A Maintenance Policy Selection Tool for Industrial Machine Parts., , , and . BASYS, volume 159 of IFIP, page 431-440. Springer, (2004)Modelling and Simulation of Human-Centred Assembly Systems - A Real Case Study., , , , and . BASYS, volume 159 of IFIP, page 405-412. Springer, (2004)Development and implementation of a generic order release scheme for modelling MRP-controlled finite-capacitated manufacturing environments., , and . Int. J. Computer Integrated Manufacturing, 17 (6): 561-576 (2004)Hardware Implementation of Efficient Modified Karatsuba Multiplier Used in Elliptic Curves., , and . I. J. Network Security, 11 (3): 155-162 (2010)Simulating the integration of original equipment manufacturers and suppliers in fractal environment., and . IJSPM, 7 (3): 148-158 (2012)Multi-modal Medical Volumes Fusion by Surface Matching., , and . MICCAI, volume 1679 of Lecture Notes in Computer Science, page 672-679. Springer, (1999)Memristor-Based AES Key Generation for Low Power IoT Hardware Security Modules., , , and . MWSCAS, page 231-234. IEEE, (2019)