Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Single image dehazing with a physical model and dark channel prior., , , and . Neurocomputing, (2015)Miniaturized systems with microchips for four isothermal amplification reactions., , and . BMEI, page 407-411. IEEE, (2015)Profiling and analysis of object lazy allocation in Java programs., , , , , and . SNPD, page 591-596. IEEE Computer Society, (2016)Piezoelectric MEMS devices and its application as bio-chemical sensors., , , , , , and . NEMS, page 163-166. IEEE, (2013)Volume Measurement of a 28Si-Enriched Sphere for a Determination of the Avogadro Constant at NMIJ., , , , , and . IEEE Trans. Instrumentation and Measurement, 68 (6): 1913-1920 (2019)VBLSH: Volume-balancing locality-sensitive hashing algorithm for K-nearest neighbors search., , , , , and . Inf. Sci., (2022)An improved fractional-order differentiation model for image denoising., , , and . Signal Processing, (2015)Transformation of potential medical demand in China: A system dynamics simulation model., , , , , , and . Journal of Biomedical Informatics, (2015)YinYang bipolar logic and bipolar fuzzy logic., and . Inf. Sci., 165 (3-4): 265-287 (2004)Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme., , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 454-462. Springer, (2014)