Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Grid based two transmission range strategy for MANETs., and . ICCCN, page 235-240. IEEE, (2005)Conditional Single Tree Search Sphere Decoding., , , , and . VTC Spring, page 1-4. IEEE, (2015)Semi-lock: An Efficient Cheat-Proof Synchronization Mechanism for Peer-to-Peer Game Systems., , , and . EUC, volume 4096 of Lecture Notes in Computer Science, page 935-944. Springer, (2006)The Application of Image Retrieval Technology in the Prevention of Diseases and Pests in Fruit Trees., , , and . CCTA (1), volume 419 of IFIP Advances in Information and Communication Technology, page 160-167. Springer, (2013)Feature-filtered fuzzy clustering for condition monitoring of tool wear., , , and . J. Intell. Manuf., 7 (1): 13-22 (1996)Soil Salinity Inversion Model of Oasis in Arid Area Based on UAV Multispectral Remote Sensing., , , , and . Remote. Sens., 14 (8): 1804 (2022)Irvsp: To obtain irreducible representations of electronic states in the VASP., , , and . Comput. Phys. Commun., (2021)Elemental Phase Partitioning in the γ-γ″ Ni2CoFeCrNb0.15 High Entropy Alloy., , , , , , , and . Entropy, 20 (12): 910 (2018)An on-chip security guard based on zero-power authentication for implantable medical devices., , , , , and . MWSCAS, page 531-534. IEEE, (2014)A CGS-MSM PGA Based on Multi-agent and Its Application in Reactive Power Optimization., , and . CSSE (1), page 548-551. IEEE Computer Society, (2008)