Author of the publication

A low output ripple and high security on-chip voltage regulation based on Fourier transform.

, , , , , , , , , , and . Int. J. Circuit Theory Appl., 51 (6): 2578-2591 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Highly Scalable Integrated Voltage Equalizer Based on Parallel-Transformers for High-Voltage Energy Storage Systems., , , , , and . IEEE Trans. Ind. Electron., 71 (1): 595-603 (2024)Feature-reinforced dual-encoder aggregation network for flue-cured tobacco grading., , , , , and . Comput. Electron. Agric., (July 2023)A deep belief network based precipitation forecast approach using multiple environmental factors., , , , and . Intell. Data Anal., 22 (4): 843-866 (2018)A machine learning low-dropout regulator-assisted differential power analysis attack countermeasure with voltage scaling., , , , , , , , , and 1 other author(s). Int. J. Circuit Theory Appl., 51 (7): 3105-3117 (July 2023)Arbitrary-Shaped Building Boundary-Aware Detection With Pixel Aggregation Network., , , , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2021)A Microscopic Model of Vehicle CO₂ Emissions Based on Deep Learning - A Spatiotemporal Analysis of Taxicabs in Wuhan, China., , and . IEEE Trans. Intell. Transp. Syst., 23 (10): 18446-18455 (2022)Automatic generation of predictive monitors from scenario-based specifications., , , and . Inf. Softw. Technol., (2018)Ponzi Scheme Detection Based on Control Flow Graph Feature Extraction., , , , and . ICWS, page 585-594. IEEE, (2023)Effa: a proM plugin for recovering event logs., , , , and . Internetware, page 108-111. ACM, (2016)Reinforcement Learning Control of a Real Mobile Robot Using Approximate Policy Iteration., , , and . ISNN (3), volume 5553 of Lecture Notes in Computer Science, page 278-288. Springer, (2009)