Author of the publication

Interoperability Performance Analysis and Assessment of B2a/L5/E5a.

, , , , and . CSPS (3), volume 517 of Lecture Notes in Electrical Engineering, page 990-998. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

E2LLM: Encoder Elongated Large Language Models for Long-Context Understanding and Reasoning., , , , , , and . CoRR, (2024)An Intrusion Detection Model Based on Intention Modeling., , , and . Security and Management, page 24-29. CSREA Press, (2007)Dynamic Hierarchical Distributed Intrusion Detection System Based on Multi-Agent System., , , and . IAT Workshops, page 89-93. IEEE Computer Society, (2006)Articulation-to-Speech Synthesis Using Articulatory Flesh Point Sensors' Orientation Information., , , , , and . INTERSPEECH, page 3152-3156. ISCA, (2018)Using an improved C4.5 for imbalanced dataset of intrusion., , , , and . PST, volume 380 of ACM International Conference Proceeding Series, page 67. ACM, (2006)Compile-Time Automatic Synchronization Insertion and Redundant Synchronization Elimination for GPU Kernels., , , and . ICPADS, page 826-834. IEEE Computer Society, (2016)Spatiotemporally asynchronous sampled-data control of a linear parabolic PDE on a hypercube., and . Int. J. Control, 95 (12): 3326-3335 (2022)Sliding Mode Control of Surface-Mount Permanent-Magnet Synchronous Motor Based on Error Model with Unknown Load., and . J. Softw., 6 (5): 819-825 (2011)DC renewable connected building grid for intelligent LED lighting system., , , , and . ISIE, page 970-974. IEEE, (2017)The Self-Evolving Logic of Financial Claim Prices, and . Genetic Algorithms and Genetic Programming in Computational Finance, chapter 12, Kluwer Academic Press, (2002)