Southeastern University, ChinaEmail: firstname.lastname@example.org; email@example.com
Mathematics, Automation and Computer-Aided Engineering, Information Systems, Computing
manufacturing techniques (Biomanufacturing), 3D printing techniques, Biomaterials.
Energy, Renewable Energy (Geothermal, Solar), Carbon capture, Biofuel,
Environmental Engineering, Application of nano technology in Energy engineering,
Application of Artificial; Intelligence in petroleum engineering.
Research Interest: Cover Document Image Processing, Pattern Recognition, Machine Learning,
and Data Mining.
Information Assurance, Soft Computing (AI, Neural Networks, Fuzzy Systems, etc.
Databases, Digital Libraries, Discrete Mathematics, Distributed, Parallel, and
Research Interest: Numerical Analysis, Discrete Mathematics,
Mathematical Software, Signal Processing , Database Management System,
Information Technology, Software Engineering.
Optics, Liquid Crystals, Optical Metrology, Optical instrument Development.
Research Interest: Statistic Signal Processing, Digital Signal Processing, Machine Learning,
Kernel Methods, Neural Networks, Reinforcement Learning, Prediction And Estimation,
Pattern Recognition. ACADEMIC.
& link analysis, Data analysis & mining, Data technologies.
systems, Digital image processing, Data compression, Pattern recognition, Neural
of Energy Systems, Exergy, Energy System Analysis, Combined Heat and Power
(CHP) Systems Design, Pinch Technology, Fuel Cell Technology and Nanotechnology.
and Informatics Engineering, Artificial Intelligence, Evolutionary Computation,
Information Systems, Database Modelling, Business Intelligence.
Research Interest: Hydrogeology, Hydrochemistry, Artificial
intelligence modeling and numerical modeling, Karst.
Fiber Lasers, Optical Communication Components As Well As Other Optical Sensors.
& Cyber Security – Remote User Authentication – Three Factor Authentication
Schemes/Protocols/Security Framework/Architectures – Military & Defense
C4I/C2 Middleware Architectures, Smartcard and Smartphone Digital
Authentication Protocols – Digital Forensics (IBM QRadar/App Scan) - Healthcare
Informatics and Security – Cloud Computing Security – Internet of Things (IoT)
Published On: March 13, 2017 | Pages: 012 - 020Abstract View Full Article View
Published On: March 07, 2017 | Pages: 001 - 011Abstract View Full Article View
Published On: December 30, 2016 | Pages: 018 - 019Abstract View Full Article View
Published On: December 30, 2016 | Pages: 012 - 017Abstract View Full Article View