Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Abused Webpage Detection Method Based on Screenshots Text Recognition., , , , and . ICEA, page 106-110. ACM, (2021)Mining Cross-network Association for YouTube Video Promotion., , and . ACM Multimedia, page 557-566. ACM, (2014)kNN-CAM: A k-Nearest Neighbors-based Configurable Approximate Floating Point Multiplier., , , , , and . ISQED, page 1-7. IEEE, (2019)The Canny Edge Detection and Its Improvement., , , and . AICI, volume 7530 of Lecture Notes in Computer Science, page 50-58. Springer, (2012)Practical and Effective Domain-Specific Function Unit Design for CGRA., , , , and . ICCSA (5), volume 6786 of Lecture Notes in Computer Science, page 577-592. Springer, (2011)Assessing the Energy Consumption of Proactive Mobile Edge Caching in Wireless Networks., , , , , and . IEEE Access, (2019)Composite Optimization for Electromigration Reliability and Noise in Power Grid Networks., , , and . ISCAS, page 1-5. IEEE, (2019)A Complex Prime Numerical Representation of Amino Acids for Protein Function Comparison., , , and . J. Comput. Biol., 23 (8): 669-677 (2016)Performance of an array receiver with a Kalman channel predictor for fast Rayleigh flat fading environments., and . IEEE J. Sel. Areas Commun., 19 (6): 1164-1172 (2001)Point cloud registration algorithm based on the volume constraint., , and . J. Intell. Fuzzy Syst., 38 (1): 197-206 (2020)