Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of intelligent equipment support concept., , , , , and . CIPAE, page 979-982. ACM, (2021)Virtual cell interference alignment in ultra dense network., , , , and . ICCC, page 1-6. IEEE, (2016)Simulation and Performance Evaluation of Laser Heterodyne Spectrometer Based on CO2 Absorption Cell., , , , , , and . Remote. Sens., 15 (3): 788 (February 2023)Airborne Validation Experiment of 1.57-μm Double-Pulse IPDA LIDAR for Atmospheric Carbon Dioxide Measurement., , , , , , , , , and 3 other author(s). Remote. Sens., 12 (12): 1999 (2020)DiffDomain Enables Identification of Structurally Reorganized Topologically Associating Domains., , , , , , , and . RECOMB, volume 13278 of Lecture Notes in Computer Science, page 302-303. Springer, (2022)Phylophenetic properties of metabolic pathway topologies as revealed by global analysis, , , , , , , , , and . BMC Bioinformatics, 7 (1): 252+ (2006)On the Virtual Cell Transmission in Ultra Dense Networks., , , , , and . Entropy, 18 (10): 374 (2016)An Analysis of Typical Scenarios and Design Suggestions for the Application of V2X Technology., , , , , , , and . HCI (8), volume 14018 of Lecture Notes in Computer Science, page 552-559. Springer, (2023)A Literature Review of Current Practices to Evaluate the Usability of External Human Machine Interface., , , , and . HCI (8), volume 14018 of Lecture Notes in Computer Science, page 573-586. Springer, (2023)Security risk assessment method for delivery robot based on two-dimensional cloud model., , , , and . CNIOT, page 297-303. ACM, (2023)