Fengying Wang

According to our database1, Fengying Wang authored at least 12 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2023
Photovoltaic Maximum Power Point Tracking Control and Neural Network Modeling Based on Improved Perturbation Observation Method.
Proceedings of the 6th International Conference on Signal Processing and Machine Learning, 2023

Research on Positioning and dimension measurement of truck compartment based on Semantic segmentation in automatic loading system.
Proceedings of the 6th International Conference on Signal Processing and Machine Learning, 2023

2022
New Metabolic Alterations and A Predictive Marker Pipecolic Acid in Sera for Esophageal Squamous Cell Carcinoma.
Genom. Proteom. Bioinform., August, 2022

2021
Research on the Precision of Grassroots Public Cultural Services Based on User Persona.
Proceedings of the 16th International Conference on Computer Science & Education, 2021

2020
Synchronization of Dynamical Networks with Non-identical Nodes by Switching Network Control.
Proceedings of the 2020 International Conference on Applications and Techniques in Cyber Intelligence, 2020

2019
A service composition approach based on overall QoS and modified graphplan.
Int. J. Web Grid Serv., 2019

Research on the Influencing Factors of Residents' Travel Based on Bayesian Network.
Proceedings of the Cyber Security Intelligence and Analytics, 2019

2013
A finite equivalence of multisecret sharing based on Lagrange interpolating polynomial.
Secur. Commun. Networks, 2013

2012
A Finite Equivalence of Verifiable Multi-secret Sharing.
Int. J. Comput. Intell. Syst., 2012

2010
Trustworthy Information: Concepts and Mechanisms.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

2008
Usage Control Resource Dissemination Model Based on Fuzzy Logic.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

2007
The Research and Application of Resource Dissemination Based on Credibility and UCON.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...