Author of the publication

Positioning method for pipeline security pre-warning system based on the third-order cumulant algorithm.

, , , , , and . AIM, page 1576-1578. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leader-follower consensus of multiagent systems via reset observer-based control approach., , , , , and . J. Frankl. Inst., 361 (3): 1555-1565 (2024)All-trans retinoic acids induce differentiation and sensitize a radioresistant breast cancer cells to chemotherapy, , , , , , , , , and . BMC Complementary and Alternative Medicine, (2016)Consensus Answers for Queries over Probabilistic Databases, and . CoRR, (2008)Bayesian Information Criterion for Signed Measurements With Application to Sinusoidal Signals., , , and . IEEE Signal Process. Lett., 25 (8): 1251-1255 (2018)Generative Adversarial Mapping Networks., , and . CoRR, (2017)The Application of the OPTICS Algorithm in the Maize Precise Fertilization Decision-Making., , , and . CCTA (1), volume 478 of IFIP Advances in Information and Communication Technology, page 317-324. (2015)An Efficient Scene Semantic Labeling Approach for 3D Point Cloud., , and . ITSC, page 2115-2120. IEEE, (2015)Parallel contributions of distinct human memory systems during probabilistic learning., , and . NeuroImage, 55 (1): 266-276 (2011)Efficient k-Regret Query Algorithm with Restriction-free Bound for any Dimensionality., , , , and . SIGMOD Conference, page 959-974. ACM, (2018)Representation for topological relations of four simple regions., , and . FSKD, page 2961-2965. IEEE, (2012)