Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The optimization research of node localization algorithm based on wireless sensor network., , , and . BMEI, page 929-934. IEEE, (2014)Research on a high noise immunity transmission system and its performance in short-range wireless communication based on the MIMO-UWB technology., and . ICNC-FSKD, page 652-656. IEEE, (2016)Comparative genomic analysis of NAC transcriptional factors to dissect the regulatory mechanisms for cell wall biosynthesis., , , , , and . BMC Bioinform., 13 (S-15): S10 (2012)PMRD: plant microRNA database., , , , , , , , and . Nucleic Acids Res., 38 (Database-Issue): 806-813 (2010)Reconstruction of Fine Grayscale Image with Low Sampling Rate Based on the Salience Analysis., and . ICNC-FSKD, page 1198-1202. IEEE, (2018)An Efficient Intra Prediction Algorithm for HEVC Intra-coding., and . CISP-BMEI, page 407-412. IEEE, (2020)Single Image Super-Resolution via Wide-Activation Feature Distillation Network., , , , , , and . Sensors, 24 (14): 4597 (July 2024)agriGO v2.0: a GO analysis toolkit for the agricultural community, 2017 update., , , , , , , and . Nucleic Acids Res., 45 (Webserver-Issue): W122-W129 (2017)Compensation and Simulation of Restrictive Memory Least Square Method for BOD Soft Measurement Mechanism Model., , , , , and . ICNC (1), page 115-118. IEEE Computer Society, (2009)Privacy-Preserving Popularity-Based Deduplication against Malicious Behaviors of the Cloud., , , and . AsiaCCS, ACM, (2024)