Search for persons
X
?
2022 International Conference on Intelligent Systems and Computational Intelligence (ICISCI) ,
2
Fast LMS-based Compound Algorithm for Modelling Long Memory..:
, In:
?
2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) ,
3
Implementation of an Image Compression Algorithm Based on L..:
, In:
?
2019 2nd International Conference on Information Systems and Computer Aided Education (ICISCAE) ,
4
Application of NB-IoT Technology in Fault Monitoring of Pow..:
, In:
?
The 11th IET International Conference on Advances in Power System Control, Operation and Management (APSCOM 2018) ,
5
The equivalent circuit of the auto-transformer with taps un..:
, In:
?
Communications in Computer and Information Science; Wireless Sensor Networks ,
6
Attitude-Aware Based Geographical Opportunity Routing Proto..:
, In:
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Digital Forensics and Cyber Crime ,
7
Power Analysis Attack Based on GA-Based Ensemble Learning:
, In:
?
Proceedings of the 6th International Conference on Electrical Engineering and Information Technologies for Rail Transportation (EITRT) 2023; Lecture Notes in Electrical Engineering ,
8
Dynamic Interaction Study on Double-Pantograph and Rigid-Ca..:
, In:
?
Wisdom, Well-Being, Win-Win; Lecture Notes in Computer Science ,
9
An Exploratory Study on a Physical Picture Book Representat..:
, In:
?
Lecture Notes in Electrical Engineering; Proceedings of the 13th International Conference on Computer Engineering and Networks ,
10
Research on Strategies for Improving the Operation and Main..:
, In:
?
2023 35th Chinese Control and Decision Conference (CCDC) ,
11
An Iterated Greedy Algorithm Based on Accelerated Calculati..:
, In:
?
2023 IEEE 20th Consumer Communications & Networking Conference (CCNC) ,
12
Reducing Redundant Transmissions for Message Broadcast in V..:
, In:
?
Theoretical Aspects of Software Engineering; Lecture Notes in Computer Science ,
13
Verified Transformation of Continuation-Passing Style into ..:
, In:
?
Boundaries of Religious Freedom: Regulating Religion in Diverse Societies; The Sociology of Shari'a ,
14
Between the Sacred and the Secular: Living Islam in China:
, In:
?
Programming Languages and Systems; Lecture Notes in Computer Science ,
15