Author of the publication

Simulation of apple tree branch growth using an improved point-cloud-boundary-constraint model.

, , , , and . Multim. Tools Appl., 83 (3): 7417-7432 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint Channel Training and Feedback for FDD Massive MIMO Systems., , , , and . IEEE Trans. Vehicular Technology, 65 (10): 8762-8767 (2016)Revealing the Correlation between Population Density and the Spatial Distribution of Urban Public Service Facilities with Mobile Phone Data., , and . ISPRS Int. J. Geo Inf., 9 (1): 38 (2020)Optimal Network-Centric Planning for Airborne Relay Communications., , , , , , , and . IEEE Syst. J., 12 (4): 3450-3460 (2018)Embedding image watermarks in dc components., , and . IEEE Trans. Circuits Syst. Video Techn., 10 (6): 974-979 (2000)What do participants think of today's MOOCs: an updated look at the benefits and challenges of MOOCs designed for working professionals., , , , and . J. Comput. High. Educ., 32 (2): 307-329 (2020)Selecting Genes with Dissimilar Discrimination Strength for Sample Class Prediction., , , , , and . APBC, volume 5 of Advances in Bioinformatics and Computational Biology, page 81-90. Imperial College Press, (2007)A Framework for Location-Aware Strategies in Cognitive Radio Systems., , and . IEEE Wirel. Commun. Lett., 1 (1): 30-33 (2012)Generative Adversarial Networks for Black-Box API Attacks with Limited Training Data., , , and . CoRR, (2019)Deep Supervised Hashing with Triplet Labels., , and . ACCV (1), volume 10111 of Lecture Notes in Computer Science, page 70-84. Springer, (2016)(L, M)-fuzzy internal relations and (L, M)-fuzzy enclosed relations., and . J. Intell. Fuzzy Syst., 36 (6): 5153-5165 (2019)