Author of the publication

Susceptibility Mapping of Typical Geological Hazards in Helong City Affected by Volcanic Activity of Changbai Mountain, Northeastern China.

, , , and . ISPRS Int. J. Geo Inf., 11 (6): 344 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Employment and Entrepreneurship of Retired Servicemen Under the New Situation., and . DMI, volume 376 of Frontiers in Artificial Intelligence and Applications, page 33-42. IOS Press, (2023)Older adults with perivascular spaces exhibit cerebrovascular reactivity deficits., , , , , , , , , and 5 other author(s). NeuroImage, (2022)Designing an Android-Based Application for Geohazard Reduction Using Citizen-Based Crowdsourcing Data., , , , and . Mob. Inf. Syst., (2018)BLEselect: Gestural IoT Device Selection via Bluetooth Angle of Arrival Estimation from Smart Glasses., , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (4): 198:1-198:28 (2022)Should short warranty always be interpreted as low quality: the effect of brand advantages on warranty's signalization., , , and . Int. J. Prod. Res., 57 (14): 4468-4479 (2019)CogniDot: Vasoactivity-based Cognitive Load Monitoring with a Miniature On-skin Sensor., , , , and . CoRR, (2024)Landslide Susceptibility Mapping along a Rapidly Uplifting River Valley of the Upper Jinsha River, Southeastern Tibetan Plateau, China., , , and . Remote. Sens., 14 (7): 1730 (2022)MFRL-BI: Design of a Model-free Reinforcement Learning Process Control Scheme by Using Bayesian Inference., , and . CoRR, (2023)Stratified Sampling for Association Rules Mining., and . AIAI, volume 187 of IFIP, page 79-88. Springer, (2005)Network Configuration Management in Heterogeneous ATM Environments., , , and . IATA, volume 1437 of Lecture Notes in Computer Science, page 72-88. Springer, (1998)