Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel Intelligence in CPSSs: Being, Becoming, and Believing., , , , and . IEEE Intell. Syst., 38 (6): 75-80 (November 2023)VistaGPT: Generative Parallel Transformers for Vehicles With Intelligent Systems for Transport Automation., , , , , , , and . IEEE Trans. Intell. Veh., 8 (9): 4198-4207 (September 2023)A P2P global trust model based on recommendation, , and . Proceedings of International Conference on Machine Learning and Cybernetics, 7, page 3975-3980. (2005)A FT Trimming Circuit Based on EPROM and Pin Multiplexing., , , , and . ASICON, page 1-4. IEEE, (2019)Novel broken line detection circuit for multi-cells Li-ion battery protection ICs., , , , , , , , and . IET Circuits Devices Syst., 13 (2): 226-232 (2019)An Over-Relaxed (A, η, m)-Proximal Point Algorithm for System of Nonlinear Fuzzy-Set Valued Operator Equation Frameworks and Fixed Point Problems., , , and . IUKM, volume 7027 of Lecture Notes in Computer Science, page 133-142. Springer, (2011)Knowledge-Guided Clustering of Large-Scale Time Series under Wavelet Transformation., , , and . AICI, volume 7530 of Lecture Notes in Computer Science, page 126-133. Springer, (2012)An Improved Edge Detection Method for Image Corrupted by Gaussian noise., and . CCTA (2), volume 294 of IFIP Advances in Information and Communication Technology, page 1153-1159. Springer, (2008)An Evolutionary Game-Based Trust Cooperative Stimulation Model for Large Scale MANETs., , , , , and . IJDSN, (2013)Covert Security with Public Verifiability: Faster, Leaner, and Simpler., , , , and . IACR Cryptology ePrint Archive, (2018)