Author of the publication

Optimized energy management for plug-in hybrid vehicles with predicted driving cycles1.

, , , and . J. Intell. Fuzzy Syst., 46 (3): 6399-6409 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient ECC-Based Conditional Privacy-Preserving Aggregation Signature Scheme in V2V., , , , , , , and . IEEE Trans. Veh. Technol., 72 (11): 15028-15039 (November 2023)Predicting Rice Grain Yield Based on Dynamic Changes in Vegetation Indexes during Early to Mid-Growth Stages., , , , , , , , and . Remote. Sens., 11 (4): 387 (2019)Cost-effectively improving solid state drive lifetime by hierarchical redundancy and heterogeneous memories., , , , and . Concurr. Comput. Pract. Exp., (2022)Use of an Active Canopy Sensor Mounted on an Unmanned Aerial Vehicle to Monitor the Growth and Nitrogen Status of Winter Wheat., , , , , , , , and . Remote. Sens., 12 (22): 3684 (2020)Optimizing rice in-season nitrogen topdressing by coupling experimental and modeling data with machine learning algorithms., , , , , , , , and . Comput. Electron. Agric., (June 2023)Improving wheat yield prediction integrating proximal sensing and weather data with machine learning., , , , , , , , , and . Comput. Electron. Agric., (2022)TLP-LDPC: Three-Level Parallel FPGA Architecture for Fast Prototyping of LDPC Decoder Using High-Level Synthesis., , and . J. Comput. Sci. Technol., 37 (6): 1290-1306 (2022)Understanding Cross-Site Linking in Online Social Networks., , , , , and . ACM Trans. Web, 12 (4): 25:1-25:29 (2018)A Rivest-Shamir-Adleman-Based Robust and Effective Three-Factor User Authentication Protocol for Healthcare Use in Wireless Body Area Networks., , , , , , and . Sensors, 23 (21): 8992 (November 2023)A secure index resisting keyword privacy leakage from access and search patterns in searchable encryption., , , and . J. Syst. Archit., (2021)