Author of the publication

Cross-Layer Performance Analysis of Two-Hop Wireless Links with Adaptive Modulation.

, , , , , and . PIMRC, page 1-5. IEEE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A reinforcement learning approach to map reduce auto-configuration under networked environment., , , and . Int. J. Secur. Networks, 12 (3): 135-140 (2017)Selective transfer cycle GAN for unsupervised person re-identification., , and . Multimedia Tools Appl., 79 (17-18): 12597-12613 (2020)Multiple object tracking in farmland based on fusion point cloud data., , , , , , and . Comput. Electron. Agric., (2022)Near-Optimal Velocity Control for Mobile Charging in Wireless Rechargeable Sensor Networks., , , , , , and . IEEE Trans. Mob. Comput., 15 (7): 1699-1713 (2016)Fingerprinting Movements of Industrial Robots for Replay Attack Detection., , , , , and . IEEE Trans. Mob. Comput., 21 (10): 3629-3643 (2022)Research on Multi-Channel Microwave Energy Harvesting System With a Shared Load., , , and . IEEE Access, (2023)Bubble Image Segmentation Based on a Novel Watershed Algorithm With an Optimized Mark and Edge Constraint., , , , and . IEEE Trans. Instrum. Meas., (2022)Method of Turns Arrangement of Noncircular Rogowski Coil With Rectangular Section., , , , , and . IEEE Trans. Instrum. Meas., (2021)Detecting PLC Intrusions Using Control Invariants., , , , , and . IEEE Internet Things J., 9 (12): 9934-9947 (2022)On Feasibility of Coordinated Time-Delay and False Data Injection Attacks on Cyber-Physical Systems., , , and . IEEE Internet Things J., 9 (11): 8720-8736 (2022)