Author of the publication

Application of BP Network-Based Multi-sensor Fusion Techniques in Measurement of the Unburned Carbon in Fly Ash.

, , , , and . ISNN (3), volume 3498 of Lecture Notes in Computer Science, page 674-679. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating Gaussian Process with Reinforcement Learning for Adaptive Service Composition., , , and . ICSOC, volume 9435 of Lecture Notes in Computer Science, page 203-217. Springer, (2015)Integrating Trust with User Preference for Effective Web Service Composition., , , , and . IEEE Trans. Serv. Comput., 10 (4): 574-588 (2017)Component Oriented Modelling and Design of Fuzzy Control Scheme for a Class of Pneumatic Actuators., , and . J. Intell. Fuzzy Syst., 5 (3): 229-243 (1997)Identity-Based Higncryption., and . IACR Cryptology ePrint Archive, (2019)Delegatable Order-Revealing Encryption., , and . AsiaCCS, page 134-147. ACM, (2019)Integrating Reinforcement Learning with Multi-Agent Techniques for Adaptive Service Composition., , , , , , and . ACM Trans. Auton. Adapt. Syst., 12 (2): 8:1-8:42 (2017)Identity-based authenticated encryption with identity confidentiality., , and . Theor. Comput. Sci., (2022)Online reliability time series prediction via convolutional neural network and long short term memory for service-oriented systems., , , , and . Knowl. Based Syst., (2018)Integrating recurrent neural networks and reinforcement learning for dynamic service composition., , , , , and . Future Gener. Comput. Syst., (2020)A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption., , and . Secur. Commun. Networks, 7 (1): 14-32 (2014)