Author of the publication

Research on the Simplified SVPWM for Three-Phase/Switches Y-Type Two-Level Rectifier.

, , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proportional Fair Secrecy Beamforming for MISO Heterogeneous Cellular Networks With Wireless Information and Power Transfer., , and . IEEE Trans. Commun., 67 (8): 5659-5673 (2019)Robust MISO Beamforming With Cooperative Jamming for Secure Transmission From Perspectives of QoS and Secrecy Rate., , , and . IEEE Trans. Commun., 66 (2): 767-780 (2018)Transforming Geometrically Enhanced Conceptual Model Schemas to GML.. Conceptual Modelling and Its Theoretical Foundations, volume 7260 of Lecture Notes in Computer Science, page 251-267. Springer, (2012)QoS-constrained multi-objective distributed data-intensive web service composition - NSGA-II with repair method., , and . GECCO Companion, page 105-106. ACM, (2020)A Polarization-Imaging-Based Machine Learning Framework for Quantitative Pathological Diagnosis of Cervical Precancerous Lesions., , , , , , , , and . IEEE Trans. Medical Imaging, 40 (12): 3728-3738 (2021)Memetic EDA-Based Approaches to QoS-Aware Fully Automated Semantic Web Service Composition., , , and . IEEE Trans. Evol. Comput., 26 (3): 570-584 (2022)Multi-stage emergency decision-making method based on cumulative prospect theory and intuitionistic fuzzy number., , , , and . RAIRO Oper. Res., 55 (Supplement): S2953-S2968 (2021)Revisiting Model Order Selection: A Sub-Nyquist Sampling Blind Spectrum Sensing Scheme., , , and . IEEE Trans. Wirel. Commun., 22 (5): 3371-3383 (May 2023)Reconfigurable Intelligent Surface With Energy Harvesting Assisted Cooperative Ambient Backscatter Communications., , , , , and . CoRR, (2022)Comments on "Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption"., , and . IEEE Trans. Inf. Forensics Secur., 11 (4): 866-867 (2016)