Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Respiration Symptoms Monitoring in Body Area Networks, , , and . Applied Sciences, 8 (4): 568 (April 2018)Efficient Traffic Video Dehazing Using Adaptive Dark Channel Prior and Spatial-Temporal Correlations., , , , and . Sensors, 19 (7): 1593 (2019)Novel TENO schemes with improved accuracy order based on perturbed polynomial reconstruction., , and . J. Comput. Phys., (September 2023)A decision support system for evaluation of the knowledge sharing crossing boundaries in agri-food value chains., , , , , , , , and . Comput. Ind., (2019)Relationship among content type of Smartphone Use, Technostress, and Sleep Difficulty: a study of University students in China., , , , and . Educ. Inf. Technol., 28 (2): 1697-1714 (February 2023)引入时频聚集交叉项干扰抑制的大数据聚类算法 (Large Data Clustering Algorithm Introducing Time and Frequency Clustering Interference Suppression)., and . 计算机科学, 43 (4): 197-201 (2016)Transient Interference Excision in Over-the-Horizon Radar by Robust Principal Component Analysis With a Structured Matrix., , and . IEEE Geosci. Remote. Sens. Lett., 13 (1): 48-52 (2016)Intelligent Early Warning of Municipal Wastewater Lifting Pump Based on Fuzzy Neural Network., , , , and . SAFEPROCESS, page 1-6. IEEE, (2023)TreeMAN: Tree-enhanced Multimodal Attention Network for ICD Coding., , , , , and . COLING, page 3054-3063. International Committee on Computational Linguistics, (2022)Integrate Stepping-Stone Intrusion Detection Technique into Cybersecurity Curriculum., , and . AINA Workshops, page 1-6. IEEE Computer Society, (2017)