Author of the publication

Application of photogrammetry technology to industrial inspection.

, , , and . ICDIP, volume 7546 of SPIE Proceedings, page 75462V. SPIE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comparison principle for nonlocal coupled systems of fully nonlinear parabolic equations., , and . Appl. Math. Lett., 19 (11): 1272-1277 (2006)Universal approximation using dynamic recurrent neural networks: discrete-time version., , and . ICNN, page 403-408. IEEE, (1995)trieFinder: an efficient program for annotating digital gene expression (DGE) tags., , , , and . BMC Bioinform., (2014)Ensembled Tricks for Instance Segmentation., , , , , and . IWCMC, page 1418-1421. IEEE, (2020)Understanding overlay characteristics of a large-scale peer-to-peer IPTV system., , , and . ACM Trans. Multim. Comput. Commun. Appl., 6 (4): 31:1-31:24 (2010)Multi-dimensional data visualisation method based on convex-corrected Radviz., , , , , and . Int. J. Comput. Appl. Technol., 63 (1/2): 114-124 (2020)Valuation of credit contingent interest rate swap., and . Risk Decis. Anal., 4 (1): 39-46 (2013)Robust Artificial Noise Aided Transmit Method for Multicast MISO Wiretap Channels with Imperfect Covariance-Based CSI., , , , and . VTC Spring, page 1-5. IEEE, (2015)RandPeer: Membership Management for QoS Sensitive Peer-to-Peer Applications., and . INFOCOM, IEEE, (2006)Secret key generation based on private pilot under man-in-the-middle attack., , , , and . Sci. China Inf. Sci., 60 (10): 100307:1-100307:14 (2017)