Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint Resource Allocation and Task Offloading for Hybrid NOMA-assisted MEC Network with Network Slicing., , , , and . ICACT, page 164-170. IEEE, (2023)Optimal reservoir operation using a hybrid Simulated Annealing Algorithm-Genetic Algorithm., , , and . BIC-TA, page 454-458. IEEE, (2010)Function Two Direction S-Rough Sets Method in Image Hiding., , and . ICIC (3), volume 2 of Communications in Computer and Information Science, page 155-161. Springer, (2007)Velocity structure of the crust and uppermost mantle in the boundary area of the Tianshan Mountains and the Tarim Basin, , , , , , , and . Chinese Science Bulletin, 50 (3): 270--275 (Feb 1, 2005)Uniformly inserting points on square grid., , , , and . Inf. Process. Lett., 111 (16): 773-779 (2011)The LAMOST Survey of Background Quasars in the Vicinity of the Andromeda and Triangulum Galaxies -- II. Results from the Commissioning Observations and the Pilot Surveys, , , , , , , , , and 61 other author(s). (2013)cite arxiv:1304.3174Comment: 26 pages, 6 figures, AJ accepted.A Pilot Study of Top-Down Compulsory eGovernment Systems Success Model: Organizational Users Perspective., and . WHICEB, page 70. Association for Information Systems, (2012)Soft Sensor Model Based on Improved Elman Neural Network with Variable Data Preprocessing and Its Application., and . J. Sensors, (2018)Cooperative Co-evolutionary Algorithm for Dynamic Multi-objective Optimization Based on Environmental Variable Grouping., , , and . ICSI (1), volume 9712 of Lecture Notes in Computer Science, page 564-570. Springer, (2016)Improved Online Algorithms for 1-Space Bounded 2-Dimensional Bin Packing., , , , , and . ISAAC (2), volume 6507 of Lecture Notes in Computer Science, page 242-253. Springer, (2010)