From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Robust Intrusion Events Recognition Methodology for Distributed Optical Fiber Sensing Perimeter Security System., , , , , , , и . IEEE Trans. Instrum. Meas., (2021)Design and Implementation of SRAM for LUT and CLB Using Clocking Mechanism in Quantum-Dot Cellular Automata., , , и . IEEE Trans. Circuits Syst. II Express Briefs, 69 (9): 3909-3913 (2022)Enhancements in formal process description by using a formal method., , , и . Autom., 71 (3): 198-208 (марта 2023)Eye localization method based on contour detection and D-S evidence theory., , , и . Signal Image Video Process., 12 (4): 599-606 (2018)The Low DC-Link Capacitance Design Consideration for Cascaded H-Bridge STATCOM., , и . IECON, стр. 4338-4343. IEEE, (2018)Efficient real-time face detection for high resolution surveillance applications., , , и . ICSPCS, стр. 1-6. IEEE, (2012)Communication Network Anomaly Detection Based on Log File Analysis., и . RSKT, том 8818 из Lecture Notes in Computer Science, стр. 240-248. Springer, (2014)Two Low-Complexity DOA Estimators for Massive/Ultra-Massive MIMO Receive Array., , , , , , и . IEEE Wirel. Commun. Lett., 11 (11): 2385-2389 (2022)Leveraging Optical Communication Fiber and AI for Distributed Water Pipe Leak Detection., , , , , , , , , и . IEEE Commun. Mag., 62 (2): 126-132 (2024)A Deep Reinforcement Learning Based Switch Controller Mapping Strategy in Software Defined Network., , , и . IEEE Access, (2020)