Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The present situation and development of machinery's integration., , , , , , , and . EMEIT, page 1836-1839. IEEE, (2011)Estimation of Medium Access Control Layer Packet Delay Distribution for IEEE 802.11., , and . CoRR, (2014)Adversarial Feature Sampling Learning for Efficient Visual Tracking., , , and . CoRR, (2018)Optimising Quality of Service through the controlled aggregation of traffic., , , and . ICITST, page 1-7. IEEE, (2010)Multiple attribute group decision making approach based on extended VIKOR and linguistic neutrosophic Set., , , and . Journal of Intelligent and Fuzzy Systems, 36 (1): 149-160 (2019)ADTH: Bounded nodal delay for better performance in wireless Ad-hoc networks., , , and . Ad Hoc Networks, (2019)Face Detection With Different Scales Based on Faster R-CNN., , , and . IEEE Trans. Cybernetics, 49 (11): 4017-4028 (2019)Robust person head detection based on multi-scale representation fusion of deep convolution neural network., , , , and . ROBIO, page 296-301. IEEE, (2017)An approach for extracting big micro-scale severe weather region trajectories automatically from meteorological radar data., , and . BigData, page 4038-4039. IEEE Computer Society, (2016)Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains., , , and . ISPEC, volume 4991 of Lecture Notes in Computer Science, page 248-262. Springer, (2008)