Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comprehensive Analysis of Winding Electromagnetic Force and Deformation During No-Load Closing and Short-Circuiting of Power Transformers., , , and . IEEE Access, (2021)Assessment of the Impact of Rubber Plantation Expansion on Regional Carbon Storage Based on Time Series Remote Sensing and the InVEST Model., , and . Remote. Sens., 14 (24): 6234 (December 2022)Computational study of energetic nitrogen-rich derivatives of 1, 1′- and 5, 5′-bridged ditetrazoles., , , and . J. Comput. Chem., 32 (10): 2298-2312 (2011)Random Access Preamble Design for Large Frequency Shift in Satellite Communication., , , , and . 5G World Forum, page 659-664. IEEE, (2019)A New Fusion Rule of Multi-focus Image Fusion Based on Wavelet Transform., , and . ICACS, page 26-29. ACM, (2018)Analysis of Target Detection Based on UWB NLOS Ranging Modeling., , , , , and . UPINLBS, page 1-6. IEEE, (2018)Application of improved AHP in the evaluation of railway emergency plans., , , and . ICNSC, page 564-569. IEEE, (2010)A load-decoupling parallel strategy based on shared memory architecture for DSMC to simulate near-continuum gases., , , , and . Comput. Phys. Commun., (2022)Cross-Connected Bidirectional Pyramid Network for Infrared Small-Dim Target Detection., , , , , and . IEEE Geosci. Remote. Sens. Lett., (2022)Tight Proofs of Identity-based Signatures without Random Oracle., , , and . Int. J. Netw. Secur., 21 (2): 290-297 (2019)