Author of the publication

Analysis of DC negative feedback mechanism in stacked power amplifiers.

, , , , , and . IEICE Electron. Express, 20 (18): 20230303 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-contact heart rate detection by combining empirical mode decomposition and permutation entropy under non-cooperative face shake., , , , , , and . Neurocomputing, (2020)Coronary arteries hemodynamics: effect of arterial geometry on hemodynamic parameters causing atherosclerosis., , , , and . Medical Biol. Eng. Comput., 58 (8): 1831-1843 (2020)The effect of rotational degree and routine activity on the risk of collapse in transtrochanteric rotational osteotomy for osteonecrosis of the femoral head - a finite element analysis., , , , , , and . Medical Biol. Eng. Comput., 58 (4): 805-814 (2020)A modified Wilkinson power divider with improved in-band performance and compact size., , , , , , and . IEICE Electron. Express, 21 (1): 20230498 (2024)Development and application of digital twin technology for integrated regional energy systems in smart cities., , and . Sustain. Comput. Informatics Syst., (2022)A dynamic anonymous authentication scheme with trusted fog computing in V2G networks., , , , and . J. Inf. Secur. Appl., (December 2023)Analysis of DC negative feedback mechanism in stacked power amplifiers., , , , , and . IEICE Electron. Express, 20 (18): 20230303 (2023)Hemodynamic characterization of transient blood flow in right coronary arteries with varying curvature and side-branch bifurcation angles., , , , and . Comput. Biol. Medicine, (2015)Identification Method of Attack Path Based on Immune Intrusion Detection., and . J. Networks, 9 (4): 964-971 (2014)ZT-Access: A combining zero trust access control with attribute-based encryption scheme against compromised devices in power IoT environments., , , , , and . Ad Hoc Networks, (June 2023)