Yuzhu Chen

Orcid: 0000-0001-8084-5799

According to our database1, Yuzhu Chen authored at least 11 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Research and Optimization of High-Performance Front-End Circuit Noise for Inertial Sensors.
Sensors, February, 2024

2023
Host-Variable-Embedding Augmented Microbiome-Based Simultaneous Detection of Multiple Diseases by Deep Learning.
Adv. Intell. Syst., December, 2023

Research and Implementation of a Demodulation Switch Signal Phase Alignment System in Dynamic Environments.
Sensors, November, 2023

Programming-Based Optimal Learning Sliding Mode Control for Cooperative Dual Ship-Mounted Cranes Against Unmatched External Disturbances.
IEEE Trans Autom. Sci. Eng., April, 2023

Flex Meta-Storms elucidates the microbiome local beta-diversity under specific phenotypes.
Bioinform., April, 2023

2022
Adaptive Neural Network-Based Tracking Control of Underactuated Offshore Ship-to-Ship Crane Systems Subject to Unknown Wave Motions Disturbances.
IEEE Trans. Syst. Man Cybern. Syst., 2022

Analysis of a Capacitive Sensing Circuit and Sensitive Structure Based on a Low-Temperature-Drift Planar Transformer.
Sensors, 2022

2020
Inlet Effect Caused by Multichannel Structure for Molecular Electronic Transducer Based on a Turbulent-Laminar Flow Model.
Sensors, 2020

2019
Wind Power Prediction for Wind Farm Clusters Based on the Multi-feature Similarity Matching Method.
Proceedings of the 2019 IEEE Industry Applications Society Annual Meeting, Baltimore, MD, USA, September 29, 2019

2015
Dynamic simulation of vegetation abundance in a reservoir riparian zone using a sub-pixel Markov model.
Int. J. Appl. Earth Obs. Geoinformation, 2015

Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2.
Proceedings of the 2015 Second International Conference on Information Security and Cyber Forensics, 2015


  Loading...