Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum computation in the decoherence-free subspaces with cavity QED., , and . Quantum Inf. Process., 13 (2): 547-557 (2014)Matching algorithm with relevance feedback for brain MRI., and . BMEI, page 365-370. IEEE, (2011)Performance Comparison of Various Multicode Modulation Schemes for High-Rate Wireless Data Transmission., , and . Wireless Personal Communications, 13 (3): 257-277 (2000)Semantic Based Integration of Heterogeneous Databases., and . BMEI, page 1-6. IEEE, (2009)A Parallel Algorithm for Matching Huge Amount of Medical Images., and . BMEI, page 1-5. IEEE, (2009)A 350-mV 2.4-GHz quadrature oscillator with nearly instantaneous start-up using series LC tanks., , and . A-SSCC, page 104-108. IEEE, (2017)State Estimation for the Individual and the Population in Mean Field Control With Application to Demand Dispatch., , and . IEEE Trans. Automat. Contr., 62 (3): 1138-1149 (2017)Distance Attenuation-Based Elliptical Weighting-g Model in Radio Tomography Imaging., and . IEEE Access, (2018)Research on EEG Classification with Neural Networks Based on the Levenberg-Marquardt Algorithm., and . ICICA (2), volume 308 of Communications in Computer and Information Science, page 195-202. Springer, (2012)Insider Threat Detection Based on Adaptive Optimization DBN by Grid Search., , , , and . ISI, page 173-175. IEEE, (2019)