Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HTML integrity authentication based on fragile digital watermarking., , , , and . GrC, page 322-325. IEEE Computer Society, (2009)iMoon: Using Smartphones for Image-based Indoor Navigation., , , , and . SenSys, page 85-97. ACM, (2015)Softwire Mesh Management Information Base (MIB)., , , , and . RFC, (May 2016)Dual-Stack Lite (DS-Lite) Management Information Base (MIB) for Address Family Transition Routers (AFTRs)., , , and . RFC, (June 2016)Classification of MRI Brain Images Using DNA Genetic Algorithms Optimized Tsallis Entropy and Support Vector Machine., , , , and . Entropy, 20 (12): 964 (2018)The Spatiotemporal Pattern and Driving Factors of Cyber Fraud Crime in China., , , , , , , and . ISPRS Int. J. Geo Inf., 10 (12): 802 (2021)Voltage Ripple Control of Flying Capacitor Three-Level Inverter With Variable Switching Frequency PSPWM., , , and . IEEE Trans. Ind. Electron., 69 (4): 3313-3323 (2022)Adaptive MPEG-4 video transmission over PSTN using buffer constraints and RTP feedback., , , , , and . ICME, page 1923-1926. IEEE Computer Society, (2004)Investigation of a Signal Demodulation Method based on Wavelet Transformation for OFDR to Enhance Its Distributed Sensing Performance., , , , , , , and . Sensors, 19 (13): 2850 (2019)Large Diamond and Small Pentagon Search Patterns for Fast Motion Estimation., , , and . ICNC (2), volume 4222 of Lecture Notes in Computer Science, page 608-616. Springer, (2006)