Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Diagnostic value of computed tomography and magnetic resonance imaging in ovarian malignant mesothelioma., , , , , , and . BMC Medical Imaging, 23 (1): 213 (December 2023)CT target scanning in the diagnosis of solid pseudopapillary tumor of the pancreas., , , , , , , and . BMC Medical Imaging, 23 (1): 214 (December 2023)Improving recall in associative memories by dynamic threshold.. Neural Networks, 7 (9): 1379-1385 (1994)Simulation of Protection/Evacuation Behavior Based on Containment Control., , , , , and . CSAE, page 37:1-37:6. ACM, (2019)Novel updatable identity-based hash proof system and its applications., , , and . Theor. Comput. Sci., (2020)Fingerprinting Far Proximity from Radio Emissions., , and . ESORICS (1), volume 8712 of Lecture Notes in Computer Science, page 508-525. Springer, (2014)Design and implementation of model framework generator., , , , and . ICMLC, page 1947-1950. IEEE, (2010)Using Pull-Based Collaborative Development Model in Software Engineering Courses: A Case Study., , , , and . DASFAA Workshops, volume 10179 of Lecture Notes in Computer Science, page 399-410. Springer, (2017)Adaptive Communication Protocols in Flying Ad Hoc Network., , and . IEEE Communications Magazine, 56 (1): 136-142 (2018)Upper Ocean Response to Super Typhoon Soudelor Revealed By Different SST Products., , , and . IGARSS, page 6063-6066. IEEE, (2018)