Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Numerical Simulation of Discrete Gust Response for a Free Flexible Aircraft., , and . AsiaSim (2), volume 324 of Communications in Computer and Information Science, page 319-327. Springer, (2012)Functional efficacy of adenosine A2A receptor agonists is positively correlated to their receptor residence time, , , and . British Journal of Pharmacology, 166 (6): 1846--1859 (2012)Weapon-Target Assignment for Multi-to-Multi Interception With Grouping Constraint., , , , , and . IEEE Access, (2019)GT-Based Performance Improving for Resource Management of Computational Grid., , , , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 1072-1077. Springer, (2005)Extended Resource Information Services Based-on Directory Service Technology., , , , and . CSCWD, page 905-909. IEEE, (2006)An adaptive transcranial direct current stimulation (tDCS)., , and . ICSAI, page 903-908. IEEE, (2019)Delayed-pilot sampling for mixture Kalman filter with application in fading channels., , and . IEEE Trans. Signal Process., 50 (2): 241-254 (2002)A Comprehensive Correction Method for Radiation Distortion of Multi-Strip Airborne Hyperspectral Images., , , , , , and . Remote. Sens., 15 (7): 1828 (April 2023)Comparative validation of multi-instance instrument segmentation in endoscopy: Results of the ROBUST-MIS 2019 challenge., , , , , , , , , and 40 other author(s). Medical Image Anal., (2021)Detection of Forwarding-Based Malicious URLs in Online Social Networks., , , , and . Int. J. Parallel Program., 44 (1): 163-180 (2016)