Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Thermal reliability of VCO using InGaP/GaAs HBTs., , and . Microelectron. Reliab., 51 (12): 2147-2152 (2011)Cluster Analysis of Real Time Location Data - An Application of Gaussian Mixture Models., , , , and . EDM, International Educational Data Mining Society (IEDMS), (2017)Joint channel assignment and link scheduling for wireless mesh networks: Revisiting the Partially Overlapped Channels., and . PIMRC, page 2063-2068. IEEE, (2010)Sudden death of distillability in a two-qutrit anisotropic Heisenberg spin model., , , , and . Quantum Inf. Process., 14 (6): 2067-2076 (2015)Mass spectra for $qcqc$, $scsc$, $qbqb$, $sbsb$ tetraquark states with $J^PC=0^++$ and $2^++$, , , , and . (2017)cite arxiv:1706.09731Comment: 15 pages, 4 figures, 5 tables, suggestions and comments welcome.Robot Control in Human Environment using Deep Reinforcement Learning and Convolutional Neural Network., , , , , and . ROBIO, page 1121-1126. IEEE, (2019)Cirrhosis classification based on MRI with duplicative-feature support vector machine (DFSVM)., , and . Biomed. Signal Process. Control., 8 (4): 346-353 (2013)Phoenixmap: An Abstract Approach to Visualize 2D Spatial Distributions., , , , and . CoRR, (2020)ONU-Dependent Dispersion Pre-Compensation at OLT for High-Speed Wide-Coverage PON., and . GLOBECOM, page 1-5. IEEE, (2015)The Application of the Pseudo Vector Multiplication in the Image Encryption Algorithm., and . ICAIC (1), volume 224 of Communications in Computer and Information Science, page 270-277. Springer, (2011)