Author of the publication

High Signal to Noise Ratio Weld Pool Imaging Device Research in CMT+P.

, , , , and . ICVIP, page 182-186. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Space-Air-Ground Integrated Network Resource Allocation Based on Service Function Chain., , , and . IEEE Trans. Veh. Technol., 71 (7): 7730-7738 (2022)Assessment of a Gauge-Radar-Satellite Merged Hourly Precipitation Product for Accurately Monitoring the Characteristics of the Super-Strong Meiyu Precipitation over the Yangtze River Basin in 2020., , , , and . Remote. Sens., 13 (19): 3850 (2021)Origami-inspired soft twisting actuator., , , , , , , , , and 1 other author(s). CoRR, (2021)Big data driven Internet of Things for credit evaluation and early warning in finance., , , and . Future Gener. Comput. Syst., (2021)A DCT-based privacy-preserving approach for efficient data mining., , , , , and . Secur. Commun. Networks, 8 (18): 3641-3652 (2015)Utilizing Fragmented Bandwidth in a Staggered Striping Multimedia System., and . DEXA, volume 1873 of Lecture Notes in Computer Science, page 161-170. Springer, (2000)New Entry Threats and Information Disclosure: Evidence from the U.S. IT Industry., , and . ICIS, Association for Information Systems, (2018)New Entry Threats, Firm Governance, and Innovation in the U.S. IT Industry., , and . ICIS, Association for Information Systems, (2015)Finite-Time Formation Control for Unmanned Aerial Vehicle Swarm System With Time-Delay and Input Saturation., , , and . IEEE Access, (2019)Data Security and Privacy Protection for Cloud Storage: A Survey., , and . IEEE Access, (2020)