Author of the publication

Design and feasibility study of roots-type power machine rotor based on numerical simulation.

, , , , and . Neural Comput. Appl., 32 (1): 223-234 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An automatically vetting mechanism for SSL error-handling vulnerability in android hybrid Web apps., , , , and . World Wide Web, 21 (1): 127-150 (2018)A novel topolgoy of multi-level converters using split wound coupled inductors., , , , and . IECON, page 4834-4838. IEEE, (2017)HPM: A novel hierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity., , , and . J. Netw. Comput. Appl., 35 (6): 1818-1830 (2012)Full-Field Calibration of Color Camera Chromatic Aberration using Absolute Phase Maps., , , , and . Sensors, 17 (5): 1048 (2017)Cost-Effective Wearable Indoor Localization and Motion Analysis via the Integration of UWB and IMU., , , , , and . Sensors, 20 (2): 344 (2020)Radio Frequency Identification and Sensing Techniques and Their Applications - A Review of the State-of-the-Art., , , , and . Sensors, 19 (18): 4012 (2019)Achieving Probabilistic Anonymity in a Linear and Hybrid Randomization Model., , , and . IEEE Trans. Inf. Forensics Secur., 11 (10): 2187-2202 (2016)Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFV., , , , , and . SecureComm (2), volume 305 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 287-301. Springer, (2019)REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET., , , and . IEEE Trans. Veh. Technol., 66 (2): 1786-1797 (2017)An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection., , and . Int. J. Netw. Secur., 4 (3): 292-305 (2007)