From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Method of Power Network Security Analysis Considering Cascading Trip., , , , и . ICGEC, том 1107 из Advances in Intelligent Systems and Computing, стр. 171-180. Springer, (2019)A Method to Prevent Cascading Trip in Power Network Based on Nodal Power., , , , и . ICGEC, том 1107 из Advances in Intelligent Systems and Computing, стр. 302-309. Springer, (2019)Integration over polytopes (abstract only)., и . ACM Conference on Computer Science, стр. 422. ACM, (1985)Instance-wise points-to analysis for loop-based dependence testing., , , и . ICS, стр. 262-273. ACM, (2002)Joint Symbol Timing and Channel Estimation for FBMC-OQAM Systems., , , , и . IEEE Access, (2019)Combinational Meta-paths Mining for Correlation Relationship Evaluation in Bibliographic Networks., , и . CollaborateCom, том 252 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 660-669. Springer, (2017)A New Efficient Algorithm for Hazardous Material Transportation Problem via Lane Reservation., , , , и . IEEE Access, (2019)Estimation of Economic Indicators using Residual Neural Network ResNet50., и . ICDM Workshops, стр. 206-209. IEEE, (2019)A Study of Online Function Approximation System Based on BP Neural Network., , , , , и . CyberC, стр. 147-150. IEEE, (2019)Intrusion Detection for Mobile Ad Hoc Networks Based on Node Reputation., , , и . Int. J. Comput. Commun. Control, 14 (5): 660-671 (2019)