Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Fast Fractional Jacket Transform., , , and . CSSP, 33 (5): 1491-1505 (2014)Efficient Indium-Doped TiOx Electron Transport Layers for High-Performance Perovskite Solar Cells and Perovskite-Silicon Tandems, , , , , , , , , and 3 other author(s). Advanced Energy Materials, (2016)Joint Relay and Jammer Selection and Power Control for physical Layer Security in Two-Way Relay Networks with Imperfect CSI., , , , , and . Wireless Personal Communications, 85 (3): 841-862 (2015)Blind source separation using joint canonical decomposition of two higher order tensors., , and . CISS, page 1-6. IEEE, (2017)A Uniform Energy Consumption Algorithm for Wireless Sensor and Actuator Networks Based on Dynamic Polling Point Selection., , , , and . Sensors, 14 (1): 95-116 (2014)Distributed Control for State-of-Energy Balancing of Supercapacitor Modules in Light Rail Vehicles., , , , , , and . IEEE Trans. Vehicular Technology, 68 (5): 4447-4457 (2019)Path optimization algorithm for agents based on artificial immune and emotional learning., , , and . ICCA, page 247-251. IEEE, (2010)Cooperative control and communication optimization for networked multi-agent systems with nonholonomic constraints., , , , , , and . ROBIO, page 1633-1637. IEEE, (2012)Distributed formation control for a cooperative multi-agent system using potential function and extremum seeking algorithm., , , , , and . ROBIO, page 1893-1898. IEEE, (2012)A Differential Privacy-Based Protecting Data Preprocessing Method for Big Data Mining., , , , , , , and . TrustCom/BigDataSE, page 693-699. IEEE, (2019)