Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Thermal entanglement of the mixed spin-1/2 and spin-5/2 Heisenberg model under an external magnetic field., , , and . Quantum Information Processing, 13 (7): 1511-1521 (2014)Interference-Aware Fault-Tolerant Energy Spanner in Wireless Ad Hoc Networks., , and . IJDSN, (2012)A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol., , and . Sensors, 19 (23): 5122 (2019)Face detection using representation learning., , and . Neurocomputing, (2016)Robust face detection using local CNN and SVM based on kernel combination., , , and . Neurocomputing, (2016)A Bit-Parallel Algorithm for Sequential Pattern Matching with Wildcards., , , , , , and . Cybernetics and Systems, 42 (6): 382-401 (2011)BPBM: An Algorithm for String Matching with Wildcards and Length Constraints., , , , , and . RSFDGrC, volume 5908 of Lecture Notes in Computer Science, page 518-525. Springer, (2009)Cluster dynamics analysis of human mobile network in urban environment., , and . WOCN, page 1-6. IEEE, (2013)Connectivity-enhanced interference-aware cooperative energy spanner in 3D cooperative wireless ad hoc networks., , , and . WOCN, page 1-7. IEEE, (2013)Pattern Matching with Wildcards based on Key Character Location., , , , , , and . IRI, page 167-170. IEEE Systems, Man, and Cybernetics Society, (2009)