Author of the publication

Consistency, Continuity and Approximation Properties of CRI Algorithm and Triple I Method.

, , and . FSKD (1), page 220-224. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hydrological responses of a semiarid catchment to land use change in North China: case study the Laohahe River Basin., , , and . IGARSS, page 3478-3481. IEEE, (2007)Distortion analysis of periodically switched nonlinear circuits., and . ISCAS (5), page 499-502. IEEE, (1999)A new WiMAX sigma-delta modulator with constant-Q active inductors., , and . ISCAS, page 1304-1307. IEEE, (2008)Applications of TRMM- and GPM-Era Multiple-Satellite Precipitation Products for Flood Simulations at Sub-Daily Scales in a Sparsely Gauged Watershed in Myanmar., , , , , , , and . Remote Sensing, 11 (2): 140 (2019)Drought Monitoring and Evaluation by ESA CCI Soil Moisture Products Over the Yellow River Basin., , , , , , , and . IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 12 (9): 3376-3386 (2019)Detecting Long-Term Urban Forest Cover Change and Impacts of Natural Disasters Using High-Resolution Aerial Images and LiDAR Data., and . Remote. Sens., 12 (11): 1820 (2020)Mobile target tracking algorithm for wireless camera sensor networks with adjustable monitoring direction of nodes., , , , and . Int. J. Commun. Syst., (2019)An efficient transient analysis algorithm for mildly nonlinearcircuits., and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 21 (6): 662-673 (2002)Security Analysis of the Access Control Solution of NDN Using BAN Logic., , and . Mob. Networks Appl., 25 (3): 1162-1173 (2020)基于上下文以及多尺度信息融合的目标检测算法 (Object Detection Algorithm Based on Context and Multi-scale Information Fusion)., , , , and . 计算机科学, 46 (6A): 279-283 (2019)