Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of a Novel Entirely Covered K 2 CORDIC., , and . NCCET, volume 396 of Communications in Computer and Information Science, page 1-8. Springer, (2013)Study of Dynamic Timeout Strategy based on flow rate metrics in high-speed networks., , and . Infoscale, volume 152 of ACM International Conference Proceeding Series, page 5. ACM, (2006)Intelligent detection method for tapping omitting of internal thread based on computer vision., , and . Int. J. Model. Identif. Control., 32 (3/4): 238-243 (2019)Information Architecture: The Design and Integration of Information Spaces, , and . (2017)Informatics for public health and health system collaboration: Applications for the control of the current COVID-19 pandemic and the next one., , and . J. Am. Medical Informatics Assoc., 28 (8): 1807-1811 (2021)Packet Loss Measurement Based on Sampled Flow., , , and . Symmetry, 13 (11): 2149 (2021)Building detection algorithm in multi-scale remote sensing images based on attention mechanism., , and . Evol. Intell., 16 (5): 1717-1728 (October 2023)A linear time algorithm for computing a most reliable source on a tree network with faulty nodes., and . Theor. Comput. Sci., 412 (3): 225-232 (2011)Data Mining with Big Data., , , and . IEEE Trans. Knowl. Data Eng., 26 (1): 97-107 (2014)Safe Real-World Reinforcement Learning for Mobile Agent Obstacle Avoidance., , , , and . CoRR, (2022)