Author of the publication

An Image Detection-Memory-Recognition Artificial Visual Unit Based on Dual-Gate Phototransistors.

, , , , , , , , , , , , and . Adv. Intell. Syst., (July 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Theory and Algorithm Based on the General Similar Relationship between the Approximate Reduction., and . ICICA (LNCS), volume 7030 of Lecture Notes in Computer Science, page 128-135. Springer, (2011)Prior knowledge-based fuzzy Support Vector Regression., , and . FUZZ-IEEE, page 392-395. IEEE, (2008)Medium optimization of antifungal metabolites produced by Bacillus globisporus A95 using response surface methodology., , , , , and . ICNC, page 384-388. IEEE, (2010)A design study for network based storage systems and performance evaluation., , , and . ICON, page 156-161. IEEE, (2002)Local Discontinuous Galerkin Method for Incompressible Miscible Displacement Problem in Porous Media., , and . J. Sci. Comput., 71 (2): 615-633 (2017)Outage Performance of Cognitive Multi-Hop Network under Interference Constraints over Nakagami-m Fading., , and . J. Commun., 11 (7): 686-692 (2016)Accurate Power Sharing of Hybrid Energy Storage System in DC Shipboard Power System Based on Quadratic Programming Algorithm., , , , , and . ISIE, page 1123-1128. IEEE, (2020)Ambiguity Function Analysis of Wireless LAN Transmissions for Passive Radar., , , , and . IEEE Trans. Aerosp. Electron. Syst., 47 (1): 240-264 (2011)Towards a Secure Certificateless Proxy Re-Encryption Scheme., , , and . ProvSec, volume 8209 of Lecture Notes in Computer Science, page 330-346. Springer, (2013)Toward extraction of security requirements from text: poster., , , , and . HotSoS, page 27:1. ACM, (2018)