Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An inter-temporal resource emergency management model., , , , and . Comput. Oper. Res., 39 (8): 1909-1918 (2012)A Möbius transformation based model for fingerprint minutiae variations., , , , and . Pattern Recognit., (2020)An upwind finite difference method for a nonlinear Black-Scholes equation governing European option valuation under transaction costs., and . Appl. Math. Comput., 219 (16): 8811-8828 (2013)Strategy research based on chess shapes for Tibetan JIU computer game., , , , and . J. Int. Comput. Games Assoc., 40 (3): 318-328 (2018)Short-Term Solar Power Forecasting Based on Weighted Gaussian Process Regression., , , , and . IEEE Trans. Ind. Electron., 65 (1): 300-308 (2018)Event-Triggered Disturbance Rejection Control of Discrete Systems., , , , and . IEEE Access, (2020)DDL-SLAM: A Robust RGB-D SLAM in Dynamic Environments Combined With Deep Learning., , , , , and . IEEE Access, (2020)Dynamics of Botnet Propagation in Software Defined Networks Using Epidemic Models., , , , and . IEEE Access, (2021)Investigation Into Recognition Algorithm of Helmet Violation Based on YOLOv5-CBAM-DCN., , , , , , and . IEEE Access, (2022)A Two-Stage Feature Transformation-Based Fingerprint Authentication System for Privacy Protection in IoT., , and . IEEE Trans. Ind. Informatics, 18 (4): 2745-2752 (2022)