Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GVM based intuitive simulation web application for collision detection., , , , , and . Neurocomputing, (2018)Derivative-based acceleration of general vector machine., , , , and . Soft Comput., 23 (3): 987-995 (2019)A Hypervisor for MIPS-Based Architecture Processors - A Case Study in Loongson Processors., , , , , , and . HPCC/EUC, page 865-872. IEEE, (2013)A methodology of weed-crop classification based on autonomous models choosing and ensemble., , , and . CoRR, (2020)A clique-based discrete bat algorithm for influence maximization in identifying top-k influential nodes of social networks., , , , , and . Soft Comput., 25 (13): 8223-8240 (2021)Temporal fusion transformer using variational mode decomposition for wind power forecasting., , and . CoRR, (2023)An Edge Based Multi-Agent Auto Communication Method for Traffic Light Control., , , , and . Sensors, 20 (15): 4291 (2020)A Server Model for Reliable Communication on Cell/B.E., , , , , , and . ICPP, page 1020-1027. IEEE Computer Society, (2013)Text classification based on machine learning for Tibetan social network., , , , , , and . CBD, page 145-150. IEEE, (2022)Research on Malicious Traffic Detection based on Word Embedding Algorithms and Neural Networks., , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 978-984. IEEE, (2023)