Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social Personality Evaluation Based on Prosodic and Acoustic Features., , , , and . ICMLSC, page 214-218. ACM, (2017)Reversible Data Hiding for Video., , , and . ICCCS (4), volume 11066 of Lecture Notes in Computer Science, page 382-391. Springer, (2018)Transmission protocol selection for dual-hop amplifyand-forward relaying networks.. IET Networks, 2 (3): 141-151 (2013)A Model of Input and Output of Science and Technology.. EMS, page 301-304. IEEE Computer Society, (2008)Self-Aligning Return Address Stack., , , and . NAS, page 278-282. IEEE Computer Society, (2012)Investigation on Estimator of Chirp Rate and Initial Frequency of LFM Signals Based on Modified Discrete Chirp Fourier Transform., , , and . Circuits Syst. Signal Process., 38 (12): 5861-5882 (2019)Robust Recognition of Mandarin Vowels by Articulatory Manners., , , , , and . ICMLSC, page 172-175. ACM, (2017)Novel Simulation and Analysis of Mie-Scattering Lidar for Detecting Atmospheric Turbulence Based on Non-Kolmogorov Turbulence Power Spectrum Model., , , and . Entropy, 24 (12): 1764 (December 2022)Video Steganography Algorithm Based on Trailing Coefficients., , , and . INCoS, page 360-364. IEEE, (2015)A Novel Information Hiding Algorithm Based on Grey Relational Analysis for H.264/AVC., , , and . INCoS, page 365-369. IEEE, (2015)