Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Unintended Consequences of Countermarketing Strategies: How Particular Antismoking Measures May Shift Consumers to More Dangerous Cigarettes., , and . Marketing Science, 35 (1): 55-72 (2016)A network traffic prediction method using two-dimensional correlation and Single exponential smoothing., , , , and . ICCT, page 403-406. IEEE, (2013)Push the Limit of Acoustic Gesture Recognition., , and . IEEE Trans. Mob. Comput., 21 (5): 1798-1811 (2022)Statistical approaches in literature: An application of principal component analysis and factor analysis to analyze the different arrangements about the Quran's Suras., , , , and . Digit. Scholarsh. Humanit., 36 (1): 164-171 (2021)The Enhancement of GSD Algorithm with Data Preprocessing Technique for WSN., , , , and . MSCC@MobiHoc, page 31-34. ACM, (2015)Statistical Covariance Based Signal Detection for Ambient Backscatter Communication Systems., , , , and . VTC Fall, page 1-5. IEEE, (2016)A Denoising Method for Mining Cable PD Signal Based on Genetic Algorithm Optimization of VMD and Wavelet Threshold., , , and . Sensors, 22 (23): 9386 (2022)TagBreathe: Monitor Breathing with Commodity RFID Systems., and . IEEE Trans. Mob. Comput., 19 (4): 969-981 (2020)Part Mutual Information Based Quality-related Component Analysis for Fault Detection., , and . CAA SAFEPROCESS, page 412-416. IEEE, (2019)Gamified Live-streaming: Is Avatar Better than Human Being?, , , and . ICIS, Association for Information Systems, (2022)