Author of the publication

A Crowd Behavior Identification Method Combining the Streakline With the High-Accurate Variational Optical Flow Model.

, , , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AdMoVeo: An Educational Robotic Platform For Learning Behavior Programming, and . DeSForM 2009: Design and Semantics of Form and Movement, page 218--219. (2009)Web structure model based on granular computing., and . GrC, page 245-250. IEEE Computer Society, (2009)A computationally efficient associative memory model of hippocampus CA3 by spiking neurons., , , and . IJCNN, page 1-8. IEEE, (2013)Delay-dependent stability analysis for continuous-time BAM neural networks with Markovian jumping parameters., , , and . Neural Networks, 23 (3): 315-321 (2010)Model of Emotional Agent., , , and . PRIMA, volume 4088 of Lecture Notes in Computer Science, page 534-539. Springer, (2006)Ontology-Based Conceptual Modeling of Policy-Driven Control Framework: Oriented to Multi-agent System for Web Services Management., , , and . AWCC, volume 3309 of Lecture Notes in Computer Science, page 346-356. Springer, (2004)Continent-Wide 2-D Co-Seismic Deformation of the 2015 Mw 8.3 Illapel, Chile Earthquake Derived from Sentinel-1A Data: Correction of Azimuth Co-Registration Error., , , , , , and . Remote Sensing, 8 (5): 376 (2016)On co-design of filter and fault estimator against randomly occurring nonlinearities and randomly occurring deception attacks., , , and . Int. J. General Systems, 45 (5): 619-632 (2016)Estimation and Mitigation of Time-Variant RFI Based on Iterative Dual Sparse Recovery in Ultra-Wide Band Through-Wall Radar., , , , , and . IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 12 (9): 3398-3411 (2019)A secure protocol for protecting the identity of providers when disclosing data for disease surveillance., , , , , , , , and . JAMIA, 18 (3): 212-217 (2011)