Author of the publication

The real time image merge method for the remote sensing image acquired from the UAV.

, , , and . IGARSS, page 1757-1759. IEEE, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification of Information Thermodynamics in a Trapped Ion System., , , , and . Entropy, 24 (6): 813 (June 2022)The research and realization of the land-use change forecasting model in development zones based on RS and GIS., , , and . IGARSS, page 3429-3432. IEEE, (2007)DeepAid: A Mobile Cognitive Aid System with Compacted Deep Learning., , , , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 873-880. IEEE, (2018)TLShps: SDN-Based TLS Handshake Protocol Simplification for IoT., , and . SpaCCS, volume 11611 of Lecture Notes in Computer Science, page 166-182. Springer, (2019)Large-scale monocular SLAM by local bundle adjustment and map joining., , , , , and . ICARCV, page 431-436. IEEE, (2010)A secure and energy balanced clustering protocol for underwater wireless sensor networks., , and . SPAC, page 193-198. IEEE, (2018)Polarized Intensity Ratio Constraint Demosaicing for the Division of a Focal-Plane Polarimetric Image., , , , , and . Remote. Sens., 14 (14): 3268 (2022)A novel stumpage detection method for forest harvesting based on multi-sensor fusion., , , , and . Signal Image Video Process., 9 (8): 1843-1850 (2015)Joint resource allocation in underwater acoustic communication networks: A game-based hierarchical adversarial multiplayer multiarmed bandit algorithm., , , , , and . Inf. Sci., (2018)Secure transmission for wireless collaborative systems based on second-order channel statistics., , , and . Trans. Emerg. Telecommun. Technol., (2020)