Author of the publication

Measuring the uncertainty of RFID data based on particle filter and particle swarm optimization.

, and . Wirel. Networks, 18 (3): 307-318 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A decomposition method for large-scale box constrained optimization., , , and . Appl. Math. Comput., (2014)An efficient privacy-preserving data query and dissemination scheme in vehicular cloud., , , , , and . Pervasive Mob. Comput., (2020)Robust PCA Using Matrix Factorization for Background/Foreground Separation., , , , , and . IEEE Access, (2018)A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies., , , , , , and . Entropy, 23 (5): 529 (2021)Dynamics analysis of a novel 5-DoF parallel manipulator with couple-constrained wrench., , , , and . Robotica, 36 (10): 1421-1435 (2018)Measuring the uncertainty of RFID data based on particle filter and particle swarm optimization., and . Wirel. Networks, 18 (3): 307-318 (2012)Matrix Factorization for User Behavior Analysis of Location-Based Social Network., , and . WISE Workshops, volume 8182 of Lecture Notes in Computer Science, page 84-97. Springer, (2013)Dynamic pricing considering strategic customers.. LISS, page 1-5. IEEE, (2016)Sentiment Analysis Based on Weighted Word2vec and Att-LSTM., , , and . CSAI/ICIMT, page 420-424. ACM, (2018)A Large-Update Primal-Dual Interior-Point Method for Second-Order Cone Programming., , , and . ISNN (1), volume 6063 of Lecture Notes in Computer Science, page 102-109. Springer, (2010)