Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deterministic secure quantum communication with mutual authentication based on bell measurement., , , , and . IEEE Congress on Evolutionary Computation, page 1-5. IEEE, (2012)A Comprehensive Evaluation Approach Based on Fuzzy Theory and Evidential Theory., , , and . FSKD (3), page 7-11. IEEE Computer Society, (2009)D&S Barcode: A Dynamic and Sensitive Barcode for Intelligent Environment Monitoring., and . Intelligent Environments, page 47-51. IEEE, (2014)Contour-cast: Location-free Data Dissemination and Discovery for Wireless Sensor Networks., , , and . ICPADS, page 88-95. IEEE Computer Society, (2009)The effect of electro-thermal parameters on IGBT junction temperature with the aging of module., , , , and . Microelectronics Reliability, (2016)Lagrangian relaxation-based routing path allocation for application-specific network-on-chips., , , and . Integration, (2018)Monocular Viewpoints Estimation for Generic Objects in the Wild., , and . IEEE Access, (2019)A Novel Approach for Diagnosis of Analog Circuit Fault by Using GMKL-SVM and PSO., , , , , and . J. Electronic Testing, 32 (5): 531-540 (2016)A multi-agent model and its speech act theory for cooperative mechanical CAD., , and . J. Intelligent Manufacturing, 10 (3-4): 341-346 (1999)Weak Greedy Routing over Graph Embedding for Wireless Sensor Networks., and . Wireless Sensor Network, 2 (9): 683-688 (2010)