Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feedback control of stable force output with evoked sEMG based on virtual hand prosthesis., , , , , , , and . CBS, page 48-52. IEEE, (2018)980nm infrared neural stimulation of sciatic nerve enhanced by carbon nanoparticles., , , , , and . NER, page 215-218. IEEE, (2017)Cooperative monitoring BGP among autonomous systems., , and . Secur. Commun. Networks, 8 (10): 1943-1957 (2015)Pattern Discovery Techniques for Music Audio., and . ISMIR, (2002)A Simplified Traffic Generating Method for Network Reliability Based on Self-Similar Model., , , and . J. Commun., 8 (10): 629-636 (2013)The method of Internet of Things access and network communication based on MQTT., , , , and . Comput. Commun., (2020)Disruption-Free Load Balancing for Aerial Access Network., , , and . Wirel. Commun. Mob. Comput., (2021)Structure optimization of multi-finger power SiGe HBTs for thermal stability improvement., , , , , and . Microelectron. Reliab., 49 (4): 382-386 (2009)Dynamic Threshold Scheme Used in Directed Diffusion., , and . ICESS, volume 3820 of Lecture Notes in Computer Science, page 220-229. Springer, (2005)面向软件安全性需求分析过程的追踪模型 (Traceability Model Oriented to Software Safety Requirement Analysis Process)., , , , , and . 计算机科学, 44 (4): 30-34 (2017)