Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vulnerability Analysis and Spoof Scheme on AoA-Based WLAN Location Systems., and . ICCCS (6), volume 11068 of Lecture Notes in Computer Science, page 199-208. Springer, (2018)A predictor-corrector smoothing Newton method for symmetric cone complementarity problems., , and . Appl. Math. Comput., 217 (7): 2989-2999 (2010)Consensus Control for Networked Manipulators With Switched Parameters and Topologies., , and . IEEE Access, (2021)Design and ground validation technique of HY-2Ascatterometer., , , , and . IGARSS, page 5175-5178. IEEE, (2014)Calibration/validation of spaceborne microwave scatterometer on HY-2A., , , and . IGARSS, page 692-694. IEEE, (2014)Hopf bifurcation and chaos of financial system on condition of specific combination of parameters., , and . J. Systems Science & Complexity, 21 (2): 250-259 (2008)Comparison of Photosynthetic Parameters and Some Physilogical Indices of 11 Fennel Varieties., , and . CSEE (1), volume 214 of Communications in Computer and Information Science, page 365-369. Springer, (2011)A New Generator of Probability Models: The Exponentiated Sine-G Family for Lifetime Studies., , , , , , and . Entropy, 23 (11): 1394 (2021)Further study on existence and uniqueness of positive solution for tensor equations., , and . Appl. Math. Lett., (2022)Research on User Complaint Problem Location and Complaint Early Warning Stragegy Based on Big Data Analysis., , , , , , , , , and . TrustCom, page 1504-1509. IEEE, (2022)