Author of the publication

An exploratory research of elitist probability schema and its applications in evolutionary algorithms.

, , , and . Appl. Intell., 40 (4): 695-709 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Training-Based Scheme for MIMO Full-Duplex Wireless Links., , and . IEEE Communications Letters, 21 (6): 1261-1264 (2017)Joint Task Offloading and Service Caching for Multi-Access Edge Computing in WiFi-Cellular Heterogeneous Networks., , , , , , and . IEEE Trans. Wirel. Commun., 21 (11): 9653-9667 (2022)Accuracy-Based Task Offloading and Resource Allocation for Edge Intelligence in IoT., , , , , and . IEEE Wirel. Commun. Lett., 11 (2): 371-375 (2022)Mixed Numerology Interference Recognition Approach for 5G NR., , , , , , and . IEEE Wirel. Commun. Lett., 10 (10): 2135-2139 (2021)A bandwidth guarantee source routing algorithm in ad hoc wireless networks (BGSR)., , , and . PIMRC, page 783-787. IEEE, (2003)A new scheme to improve TCP over wireless networks., , and . WCNC, page 1506-1509. IEEE, (2004)High data rate transmission with 64-DAPSK over fading channel., , and . WCNC, page 60-64. IEEE, (2004)Study of capacity region and minimum energy of delay-tolerant unicast mobile ad hoc networks using cell-partitioned model., , , , , and . Wirel. Commun. Mob. Comput., 16 (7): 825-849 (2016)TerminalBooster: Collaborative Computation Offloading and Data Caching via Smart Basestations., , , , and . IEEE Wirel. Commun. Lett., 5 (6): 612-615 (2016)A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources., , , , , , and . Int. J. Digit. Crime Forensics, 12 (1): 109-130 (2020)