Author of the publication

Weld Line Detection and Tracking via Spatial-Temporal Cascaded Hidden Markov Models and Cross Structured Light.

, , , and . IEEE Trans. Instrumentation and Measurement, 63 (4): 742-753 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance analysis of uplink MIMO MC-CDMA systems based on linear zero-forcing V-BLAST algorithm., and . Science in China Series F: Information Sciences, 51 (9): 1305-1318 (2008)On the Performance of V-BLAST Detectors in MIMO MT-CDMA Uplink over Multipath Fading Channel., and . ICN, page 6. IEEE Computer Society, (2007)Reversible data hiding for depth maps using the depth no-synthesis-error model., , and . Inf. Sci., (2014)Universal Chroma Subsampling Strategy for Compressing Mosaic Video Sequences With Arbitrary RGB Color Filter Arrays in H.264/AVC., , , and . IEEE Trans. Circuits Syst. Video Techn., 23 (4): 591-606 (2013)Dynamic Ontology for Supply Chain Information Integration., and . CONFENIS (1), volume 254 of IFIP, page 163-172. Springer, (2007)Interactive CT image segmentation with online discriminative learning., , , and . ICIP, page 425-428. IEEE, (2011)Personalized E-Advertisement and Experience: Recommending User Targeted Ads., , , , , and . ICEBE, page 56-61. IEEE Computer Society, (2015)Unitary isotropically distributed inputs are not capacity-achieving for large-MIMO fading channels., , and . ISIT, page 1717-1721. IEEE, (2012)An Empirical Analysis on Regional Technical Efficiency of Chinese Steel Sector based on Network DEA Method., , , and . ITQM, volume 31 of Procedia Computer Science, page 615-624. Elsevier, (2014)Efficient hierarchical identity-based signatures from lattices., , and . IJESDF, 5 (1): 1-10 (2013)