Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the approximation by operators of Bernstein-Stancu types., , and . Applied Mathematics and Computation, (2014)A variant of schnorr signature scheme for path-checking in RFID-based supply chains., , , , and . FSKD, page 2608-2613. IEEE, (2015)Design of Real-Time Monitoring and Visual Management System Based on RFID for Engineering Training., , , and . CSIE (3), page 578-581. IEEE Computer Society, (2009)QRS complex detection based wearable electrocardiogram acquistion system via computing regularity without evaluating the modulus maxima., , , , and . INDIN, page 1056-1059. IEEE, (2016)Synchronisation for smart factory - towards IoT-enabled mechanisms., , , , , and . Int. J. Computer Integrated Manufacturing, 31 (7): 624-635 (2018)Conditioning Optimization of Extreme Learning Machine by Multitask Beetle Antennae Swarm Algorithm., , , , , and . CoRR, (2018)RFID Multi-hop Relay Algorithms with Active Relay Tags in Tag-Talks-First Mode., and . CANDAR, page 617-621. IEEE Computer Society, (2013)Nonlinear switching control for suppressing the spread of avian influenza., , , , , , , , , and 1 other author(s). INDIN, page 614-617. IEEE, (2015)A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis., , , , , and . IIH-MSP, page 333-336. IEEE, (2015)A MPN-based scheduling model for IoT-enabled hybrid flow shop manufacturing., , , and . Advanced Engineering Informatics, 30 (4): 728-736 (2016)