Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Information Entropy to Analyze Dynamic Reserves of Emergency Material., and . CSO (2), page 609-612. IEEE Computer Society, (2009)978-0-7695-3605-7.Pricing strategy with customers' privacy concerns in Smart-X systems., , , , and . Enterp. Inf. Syst., 16 (3): 445-471 (2022)Image Mosaic Based on Improved Logarithmic Polar Coordinate Transformation and Ransac Algorithm., , , , , and . SimuTools, volume 295 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 608-614. Springer, (2019)Optimization Design of Electric Power Marketing System Based on Data Mining Technology., , , , and . BDSIC, page 68-72. ACM, (2022)An improved image registration and fusion algorithm., , , , , and . Wirel. Networks, 27 (5): 3597-3611 (2021)Gas Sensors Based on Electrospun Nanofibers., , , and . Sensors, 9 (3): 1609-1624 (2009)A symmetrically feeding structure for dual-polarized feeds., , , and . Turkish J. Electr. Eng. Comput. Sci., (2017)Influence of mechanism of patient-accessible hospital information system implementation on doctor-patient relationships: A service fairness perspective., , , , , and . Inf. Manag., 54 (1): 57-72 (2017)Medical image security authentication method based on wavelet reconstruction and fractal dimension., , , , , , and . Int. J. Distributed Sens. Networks, 17 (4): 155014772110141 (2021)Valuing Information Security Investment: A Real Options Approach., , , , and . BIFE, page 279-284. IEEE Computer Society, (2012)