Author of the publication

Identification of finger vein using neural network recognition research based on PCA.

, , , and . IEEE ICCI*CC, page 456-460. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Path optimization algorithm for agents based on artificial immune and emotional learning., , , and . ICCA, page 247-251. IEEE, (2010)An explicit predictive current-sharing control for parallel charging systems with nonlinear dynamics., , , , and . ACC, page 6821-6826. IEEE, (2016)Slim ARQ for Reliable Broadcasting in Wireless LANs.. WCNC, page 2164-2169. IEEE, (2008)Cooperative control and communication optimization for networked multi-agent systems with nonholonomic constraints., , , , , , and . ROBIO, page 1633-1637. IEEE, (2012)Distributed formation control for a cooperative multi-agent system using potential function and extremum seeking algorithm., , , , , and . ROBIO, page 1893-1898. IEEE, (2012)A Differential Privacy-Based Protecting Data Preprocessing Method for Big Data Mining., , , , , , , and . TrustCom/BigDataSE, page 693-699. IEEE, (2019)Optimal real-time trajectory planning for a fixed wing vehicle in 3D dynamic environment., , and . ROBIO, page 710-715. IEEE, (2013)An improved parameterized approach for real time optimal motion planning of AUV moving in dynamic environment., , and . RAM, page 103-108. IEEE, (2013)A Novel Hash Function Based on Hyperchaotic Lorenz System., , , and . ICFIE, volume 62 of Advances in Intelligent and Soft Computing, page 1529-1536. (2009)Joint Relay and Jammer Selection and Power Control for physical Layer Security in Two-Way Relay Networks with Imperfect CSI., , , , , and . Wireless Personal Communications, 85 (3): 841-862 (2015)