Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High Resolution and Speed Demodulation for Optical Fiber Fabry-Perot Magnetic Field Sensor., , , , , , , , , and . IEEE Trans. Instrum. Meas., (2024)A Verifiable Quantum Secret Sharing Scheme Based on a Single Qubit., , , and . CoRR, (2020)A quantum secret sharing scheme with verifiable function., , , and . CoRR, (2020)A Hybrid Quantum Secret Sharing Scheme Based on Mutually Unbiased Bases., , , and . FCS, volume 1286 of Communications in Computer and Information Science, page 595-607. Springer, (2020)An Application of Fuzzy Logic to Usage Parameter control in ATM Networks., and . FSKD, page 295-299. (2002)QoS-aware multicast protocol using bounded flooding (QMBF) technique., and . ICC, page 1259-1263. IEEE, (2002)Development of a tele-nursing mobile manipulator for remote care-giving in quarantine areas., , , , and . ICRA, page 3581-3586. IEEE, (2017)Fixing multi-client oscillations in HTTP-based adaptive streaming: A control theoretic approach., , , , and . MMSP, page 230-235. IEEE, (2013)A gait recognition system for rehabilitation based on wearable micro inertial measurement unit., and . ROBIO, page 1678-1682. IEEE, (2011)Infrared Small Target Detection Algorithm Based on Robust Tensor Decomposition Model within Bayesian Framework., , , and . IGARSS, page 1160-1163. IEEE, (2019)