Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...




2016 IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), 2016, p.184-187
2016

2023 40th National Radio Science Conference (NRSC), 2023, Vol.1, p.327-336
2023
Link zum Volltext

2023 9th International Conference on Control, Decision and Information Technologies (CoDIT), 2023, p.1595-1600
2023



2023 5th Novel Intelligent and Leading Emerging Sciences Conference (NILES), 2023, p.316-321
2023
Link zum Volltext

2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), 2023, p.3730-3735
2023


2020 6th Conference on Data Science and Machine Learning Applications (CDMA), 2020, p.158-163
2020
Link zum Volltext

2018 Twentieth International Middle East Power Systems Conference (MEPCON), 2018, p.850-855
2018
Link zum Volltext

An Accelerated Path Planning Approach
2018 13th International Conference on Computer Engineering and Systems (ICCES), 2018, p.15-20
2018

2020 8th International Conference on Control, Mechatronics and Automation (ICCMA), 2020, p.138-143
2020
Link zum Volltext

Electronics letters, 2000-05, Vol.36 (10), p.875-876
2000
Link zum Volltext

2017 Nineteenth International Middle East Power Systems Conference (MEPCON), 2017, p.235-241
2017

2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), 2017, p.1-4
2017
Link zum Volltext

2018 Twentieth International Middle East Power Systems Conference (MEPCON), 2018, p.298-303
2018
Link zum Volltext

2015 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2015, p.597-601
2015
Link zum Volltext

2017 Nineteenth International Middle East Power Systems Conference (MEPCON), 2017, p.1044-1047
2017


2013 Second International Japan-Egypt Conference on Electronics, Communications and Computers (JEC-ECC), 2013, p.176-181
2013

2013 23rd International Conference on Computer Theory and Applications (ICCTA), 2013, p.42-47
2013
Link zum Volltext