Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Control Theory to Guide Load Shedding in Medical Data Stream Management System., , , , , , , and . ASIAN, volume 3818 of Lecture Notes in Computer Science, page 236-248. Springer, (2005)A Three-Dimensional Ultrasonic Pen-Type Input Device With Millimeter-Level Accuracy for Human-Computer Interaction., , , and . IEEE Access, (2020)Library resources semantization based on resource ontology., , and . Electron. Libr., 32 (3): 341-362 (2014)HASVC: An Efficient Hybrid Authentication Scheme for Vehicular Communication., , , , , and . ICC, page 1-5. IEEE, (2011)Numerical investigation of a fractional diffusion model on circular comb-inward structure., , and . Appl. Math. Lett., (2020)Demand analysis and business modeling of community health services performance management., , , , , and . ICNC-FSKD, page 1381-1390. IEEE, (2016)Security Analysis of an Identity-Based Signature From Factorization Problem., , , and . IEEE Access, (2020)Learning shape metrics with Monte Carlo optimization., , , and . J. Comput. Appl. Math., (2019)Nitrogen and Phosphorus Co-Doped Carbon Dots for the Growth Promotion of Water Spinach., , , , , , and . Symmetry, 15 (8): 1532 (August 2023)The acquisition method of the user's Kansei needs based on double matrix recommendation algorithm., , , and . J. Intell. Fuzzy Syst., 41 (2): 3809-3820 (2021)