Author of the publication

Application of AHP-ICM and AHP-EWM in Collapse Disaster Risk Mapping in Huinan County.

, , , , , , and . ISPRS Int. J. Geo Inf., 12 (10): 395 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Ergativization of the Verb "死"si(Die) in Chinese Language History.. CLSW, volume 8922 of Lecture Notes in Computer Science, page 124-133. Springer, (2014)An Ordered Bipolar Outflow from a Massive Early-Stage Core, , , , , and . (Jan 24, 2016)Outflow-Confined H II Regions. I. First Signposts of Massive Star Formation, , and . (2015)cite arxiv:1509.06754Comment: 18 pages, 17 figures, submitted to ApJ.Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation., , , and . Int. J. Inf. Sec., 14 (6): 487-497 (2015)Hybrid Imitation Learning for Real-Time Service Restoration in Resilient Distribution Systems., , , , and . IEEE Trans. Ind. Informatics, 18 (3): 2089-2099 (2022)Nonrepudiable Proxy Multi-Signature Scheme., , and . J. Comput. Sci. Technol., 18 (3): 399-402 (2003)Decentralized Attribute-Based Server-Aid Signature in the Internet of Things., , , , , and . IEEE Internet Things J., 9 (6): 4573-4583 (2022)Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage., , , and . IEEE Trans. Computers, 71 (1): 175-184 (2022)Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing., , , and . KSII Trans. Internet Inf. Syst., 10 (7): 3339-3352 (2016)Efficient rate-adaptive reconciliation for CV-QKD protocol., , , , , and . Quantum Inf. Comput., 17 (13&14): 1123-1134 (2017)