Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Communication Network Anomaly Detection Based on Log File Analysis., and . RSKT, volume 8818 of Lecture Notes in Computer Science, page 240-248. Springer, (2014)The Low DC-Link Capacitance Design Consideration for Cascaded H-Bridge STATCOM., , and . IECON, page 4338-4343. IEEE, (2018)Efficient real-time face detection for high resolution surveillance applications., , , and . ICSPCS, page 1-6. IEEE, (2012)Eye localization method based on contour detection and D-S evidence theory., , , and . Signal Image Video Process., 12 (4): 599-606 (2018)Image Precise Matching With Illumination Robust in Vehicle Visual Navigation., , , and . IEEE Access, (2020)A novel active learning method for profust reliability analysis based on the Kriging model., , , and . Eng. Comput., 38 (4): 3111-3124 (2022)Design and Implementation of SRAM for LUT and CLB Using Clocking Mechanism in Quantum-Dot Cellular Automata., , , and . IEEE Trans. Circuits Syst. II Express Briefs, 69 (9): 3909-3913 (2022)Two Low-Complexity DOA Estimators for Massive/Ultra-Massive MIMO Receive Array., , , , , , and . IEEE Wirel. Commun. Lett., 11 (11): 2385-2389 (2022)Lightweight and flexible hardware implementation of authenticated encryption algorithm SIMON-Galois/Counter Mode., , , , , and . Int. J. Circuit Theory Appl., 51 (12): 5951-5961 (December 2023)A high-resolution hybrid digital pulse width modulator with dual-edge-triggered flip-flops and hardware compensation., , , , and . Int. J. Circuit Theory Appl., 49 (1): 159-168 (2021)