Author of the publication

Cycle Interference Alignment for the Full Duplex Communication System Based on User Virtual Splitting Thought.

, , , and . AINA Workshops, volume 927 of Advances in Intelligent Systems and Computing, page 286-292. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intercomparison and analyses of the climatology of the West African Monsoon in the West African Monsoon Modeling and Evaluation project (WAMME) first model intercomparison experiment, , , , , , , , , and 34 other author(s). Climate Dynamics, 35 (1): 3--27 (Jul 1, 2010)The Bayes Estimators of the Variance and Scale Parameters of the Normal Model With a Known Mean for the Conjugate and Noninformative Priors Under Stein's Loss., , and . Frontiers Big Data, (2021)Improving resilience of high-speed train by optimizing repair strategies., , , , , and . Reliab. Eng. Syst. Saf., (September 2023)Dynamic risk assessment of metro station with interval type-2 fuzzy set and TOPSIS method., , , , and . J. Intell. Fuzzy Syst., 29 (1): 93-106 (2015)On identification method of key components of mechatronics system based on network model., , , and . J. Intell. Fuzzy Syst., 36 (4): 3273-3287 (2019)Weighted dynamic time warping for traffic flow clustering., , , and . Neurocomputing, (2022)Treating COVID-19 with Chloroquine, , , , , , , , , and 8 other author(s). Journal of Molecular Cell Biology, 12 (4): 322-325 (2020)Editome Disease Knowledgebase (EDK): a curated knowledgebase of editome-disease associations in human., , , , , , , , , and 4 other author(s). Nucleic Acids Res., 47 (Database-Issue): D78-D83 (2019)Active contour-based colour image selective segmentation., , , , and . Int. J. Model. Identif. Control., 25 (1): 48-55 (2016)A Dynamic Deployment Method of Security Services Based on Malicious Behavior Knowledge Base., , , and . Sensors, 22 (22): 9021 (2022)