Personensuche
X
?
Springer Series in Geomechanics and Geoengineering; Proceedings of the International Field Exploration and Development Conference 2023 ,
1
Liquid Leakage Model in Plunger Lift:
, In:
?
2023 IEEE International Symposium on Circuits and Systems (ISCAS) ,
2
Optimization-Inspired Deep Network for Image Restoration fr..:
, In:
?
2020 5th Asia Conference on Power and Electrical Engineering (ACPEE) ,
3
A Predictive Deadbeat Grid-connected Control Method of H6 T..:
, In:
?
Proceedings of the 26th ACM international conference on Multimedia ,
4
Content-Based Video Relevance Prediction with Second-Order ..:
, In:
?
2024 5th Information Communication Technologies Conference (ICTC) ,
5
WSRDualNet: Duality Based Deep Unfolding Network for Downli..:
, In:
?
Springer Proceedings in Physics; Physics and Engineering of Metallic Materials ,
6
Recent Development of Hot-Pressed-/Deformed Nd–Fe–B Permane..:
, In:
?
Machine Learning Aided Analysis, Design, and Additive Manufacturing of Functionally Graded Porous Composite Structures ,
7
List of contributors:
, In:
?
Water Security: Big Data-Driven Risk Identification, Assessment and Control of Emerging Contaminants ,
8
List of contributors:
, In:
?
Water Security: Big Data-Driven Risk Identification, Assessment and Control of Emerging Contaminants ,
9
Pathogens in engineered water systems:
, In:
?
2023 IEEE International Conference on Mechatronics and Automation (ICMA) ,
10
MR Image Harmonization with Transformer:
, In:
?
Lecture Notes in Computer Science; Computer Vision – ECCV 2022 Workshops ,
11
MIPI 2022 Challenge on RGB+ToF Depth Completion: Dataset an..:
, In:
?
2023 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW) ,
12
The First Visual Object Tracking Segmentation VOTS2023 Chal..:
, In:
?
2023 IEEE Belgrade PowerTech ,
13
Emergency Battery Energy Storage System Shedding Against Fa..:
, In:
?
Advances in Knowledge Discovery and Data Mining; Lecture Notes in Computer Science ,
14
RLMixer: A Reinforcement Learning Approach for Integrated R..:
, In:
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
15