Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Big Picture of Integrity Verification of Big Data in Cloud Computing., , , , and . Handbook on Data Centers, Springer, (2015)Precise trajectory tracking for UAV based on active disturbance rejection control., , , and . ICCAIS, page 464-469. IEEE, (2015)Study of Data Fusion of AIS and Radar., and . SoCPaR, page 674-677. IEEE Computer Society, (2009)A new investment strategy based on data mining and Neural Networks., and . IJCNN, page 3094-3099. IEEE, (2014)A power allocation algorithm to maximize capacity in a full-duplex multi-carrier system., , , , and . WOCC, page 128-132. IEEE, (2015)Proportional-fair downlink resource allocation in OFDMA-based relay networks., , , and . Journal of Communications and Networks, 13 (6): 633-638 (2011)Application of Maximum Entropy Principle to Software Failure Prediction., , , , , and . COMPSAC, page 180-185. IEEE Computer Society, (2004)Design and implementation of a behavioral migraine management iPhone app for adolescents with migraine., , , , and . WOWMOM, page 1-6. IEEE Computer Society, (2010)A grid-based valley seeking method for spike sorting., , and . BMEI, page 593-596. IEEE, (2011)Conformal Contour Mapping for Neurosurgery Outcome Evaluation., , , , and . ISBI, page 21-24. IEEE, (2007)