Author of the publication

Automatic Multi-source Data Fusion Technique of Powerline Corridor using UAV Lidar.

, , , , , and . ISC2, page 1-5. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An input information enhanced model for relation extraction., , , , and . Neural Comput. Appl., 31 (12): 9113-9126 (2019)A 40 GHz modified-Colpitts voltage controlled oscillator with increased tuning range., , , and . ISCAS (1), page 717-720. IEEE, (2003)A Method of Polarity Computation of Chinese Sentiment Words Based on Gaussian Distribution., , , , and . CICLing (2), volume 8404 of Lecture Notes in Computer Science, page 53-61. Springer, (2014)Automatic Multi-source Data Fusion Technique of Powerline Corridor using UAV Lidar., , , , , and . ISC2, page 1-5. IEEE, (2022)Solving Discriminant Models Using Interior Point Algorithm., , and . CASDMKM, volume 3327 of Lecture Notes in Computer Science, page 51-60. Springer, (2004)Incorporating target language semantic roles into a string-to-tree translation model., , , , and . Frontiers Inf. Technol. Electron. Eng., 18 (10): 1534-1542 (2017)Investigating first-generation students' perceptions of library personnel, , , and . Performance Measurement and Metrics, 20 (1): 27--36 (February 2019)Chinese Text Analysis Based on Minimal Recursion Semantics., , , and . CLSW, volume 9332 of Lecture Notes in Computer Science, page 421-429. Springer, (2015)A Dual-role Trust Model for Social Commerce: A Guanxi Perspective., , , and . Inf. Manag., 58 (7): 103512 (2021)Catch You With Cache: Out-of-VM Introspection to Trace Malicious Executions., , and . DSN, page 326-337. IEEE, (2021)