Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets., , , , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 601-611. Springer, (2018)A Distributed Surveillance Model for Network Security Inspired by Immunology., , , , , and . AICI (2), volume 7003 of Lecture Notes in Computer Science, page 53-60. Springer, (2011)Dynamic HARQ Optimization for Voice over LTE., , , , , and . ICC, page 1-5. IEEE, (2018)DNA Computing Model of the Integer Linear Programming Problem Based on Molecular Beacon., , , and . ICIC (3), volume 4115 of Lecture Notes in Computer Science, page 238-247. Springer, (2006)Distortion Propagation Based Quantization Parameter Cascading Method for Screen Content Video Coding., , , , and . IEEE Access, (2019)Simple Algorithms for Complex Relation Extraction with Applications to Biomedical IE, , , , , and . Proc. 43rd Annual Meeting of the Association for Computational Linguistics, (2005)Study on the Cultivation of Core Competence Based on Tacit Knowledge., , and . ICEB, page 987-989. Academic Publishers/World Publishing Corporation, (2004)A Hertzian contact based model to estimate thermal resistance of thermal interface material for high-performance microprocessors., and . Microelectron. J., (2021)Holling type II predator-prey model with nonlinear pulse as state-dependent feedback control., and . J. Comput. Appl. Math., (2016)Gesture Recognition System with Aging Awareness based on Tactile Perception., , , , , , and . ICCE-TW, page 1-2. IEEE, (2020)