Autor der Publikation

Augmented-reality-driven medical simulation platform for percutaneous nephrolithotomy with cybersecurity awareness.

, , , , , , , und . Int. J. Distributed Sens. Networks, (2019)

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

 

Weitere Publikationen von Autoren mit dem selben Namen

A Differential Privacy-Based Protecting Data Preprocessing Method for Big Data Mining., , , , , , , und . TrustCom/BigDataSE, Seite 693-699. IEEE, (2019)Cooperative control and communication optimization for networked multi-agent systems with nonholonomic constraints., , , , , , und . ROBIO, Seite 1633-1637. IEEE, (2012)Distributed formation control for a cooperative multi-agent system using potential function and extremum seeking algorithm., , , , , und . ROBIO, Seite 1893-1898. IEEE, (2012)Slim ARQ for Reliable Broadcasting in Wireless LANs.. WCNC, Seite 2164-2169. IEEE, (2008)On distributed polarising relay transmission system with successive interference cancelation decoding in frequency selective fading channels., , und . Int. J. Auton. Adapt. Commun. Syst., 8 (2/3): 164-179 (2015)Stability analysis of stochastic reaction-diffusion delayed neural networks with Levy noise., und . Neural Comput. Appl., 20 (4): 535-541 (2011)Knowledge configuration model for fast derivation design of electronic equipment and its implementation., , , , und . Knowl. Based Syst., (2020)An undesirable-output-considered super-efficiency DEA model and its illustration in evaluation of thermoelectric enterprises., , und . J. Intell. Fuzzy Syst., 27 (3): 1507-1517 (2014)Three- dimensional modeling and visualization of rice root system based on the improved dual-scale automaton and L-system., , , , , , , und . Comput. Electron. Agric., (2022)Joint Relay and Jammer Selection and Power Control for physical Layer Security in Two-Way Relay Networks with Imperfect CSI., , , , , und . Wireless Personal Communications, 85 (3): 841-862 (2015)