Author of the publication

Urban Air Quality Assessment by Fusing Spatial and Temporal Data from Multiple Study Sources Using Refined Estimation Methods.

, , , and . ISPRS Int. J. Geo Inf., 11 (6): 330 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mapping the Binding Site of a Large Set of Quinazoline Type EGF-R Inhibitors Using Molecular Field Analyses and Molecular Docking Studies., , , and . Journal of Chemical Information and Computer Sciences, 43 (1): 273-287 (2003)Evaluation on DSM power-saving implementation based on DEA model., , , and . ICNSC, page 1794-1799. IEEE, (2008)Urban Air Quality Assessment by Fusing Spatial and Temporal Data from Multiple Study Sources Using Refined Estimation Methods., , , and . ISPRS Int. J. Geo Inf., 11 (6): 330 (2022)CVDHD: a cardiovascular disease herbal database for drug discovery and network pharmacology., , , , and . J. Cheminformatics, (2013)Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue., , , and . J. Enterp. Inf. Manag., 34 (3): 770-792 (2021)Design for the pricing strategy of return-freight insurance based on online product reviews., , , and . Electron. Commer. Res. Appl., (2017)Detecting clusters over intercity transportation networks using K-shortest paths and hierarchical clustering: a case study of mainland China., , , , , and . Int. J. Geogr. Inf. Sci., 33 (5): 1082-1105 (2019)安全虚拟机监视器的形式化验证研究 (Study on Formal Verification of Secure Virtual Machine Monitor)., , , and . 计算机科学, 46 (3): 170-179 (2019)An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection., , , , and . QRS, page 122-129. IEEE, (2020)A Security Model and Implementation of Embedded Software Based on Code Obfuscation., , , , and . TrustCom, page 1606-1613. IEEE, (2020)