Personensuche
X
?
2023 8th International Conference on Control, Robotics and Cybernetics (CRC) ,
1
The Shape Design of Energy Leakage Hole of 220kV High Volta..:
, In:
?
2023 8th International Conference on Control, Robotics and Cybernetics (CRC) ,
2
220kV Explosion-Proof Cable Joint Copper Shell End Circular..:
, In:
?
2023 8th International Conference on Control, Robotics and Cybernetics (CRC) ,
3
220kV Explosion-proof High-voltage Cable Joint end Folding ..:
, In:
?
2023 3rd International Conference on Electrical Engineering and Control Science (IC2ECS) ,
4
Physical Modeling and Analysis of Explosion and Combustion ..:
, In:
?
Neural Information Processing; Lecture Notes in Computer Science ,
5
Multi-relation Word Pair Tag Space for Joint Entity and Rel..:
, In:
?
2023 Power Electronics and Power System Conference (PEPSC) ,
6
Binocular Vision-Based Detection of the Shortest Distance B..:
, In:
?
2022 IEEE 24th Electronics Packaging Technology Conference (EPTC) ,
7
Effect of water film on 4H-SiC nano-indentation process:
, In:
?
2022 23rd International Conference on Electronic Packaging Technology (ICEPT) ,
8
Effect of impurity doping on 4H-SiC planarization:
, In:
?
Lecture Notes in Computer Science; Artificial Neural Networks and Machine Learning – ICANN 2022 ,
9
Chinese Named Entity Recognition Using the Improved Transfo..:
, In:
?
2022 IEEE 24th Electronics Packaging Technology Conference (EPTC) ,
10
A non-destructive inspection method for electronic packagin..:
, In:
?
2022 IEEE 24th Electronics Packaging Technology Conference (EPTC) ,
11
The effect of BNNS distribution on the plastic deformation ..:
, In:
?
2021 2nd International Conference on Information Science and Education (ICISE-IE) ,
12
Use VR Technology to Construct Physical Education Teaching ..:
, In:
?
2021 International Conference on Big Data, Artificial Intelligence and Risk Management (ICBAR) ,
13
The Application of Artificial Intelligence Technology in th..:
, In:
?
Security, Privacy, and Anonymity in Computation, Communication, and Storage; Lecture Notes in Computer Science ,
14
A Posteriori Preference Multi-objective Optimization Using ..:
, In:
?
Security, Privacy, and Anonymity in Computation, Communication, and Storage; Lecture Notes in Computer Science ,
15