Author of the publication

Simplified Theoretical Model based Self-adaptive Packet Reception Rate Estimation in Sensor Networks.

, , , , , , , and . WCNC, page 1-6. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Effcient and Secure Biometrics-based One-Time Identity-Password Authenticated Scheme for E-coupon System towards Mobile Internet., , and . J. Inf. Hiding Multim. Signal Process., 6 (3): 444-457 (2015)Memory-enhanced deep reinforcement learning for UAV navigation in 3D environment., , , , , , and . Neural Comput. Appl., 34 (17): 14599-14607 (2022)Sensing Tourist Distributions and Their Sentiment Variations Using Social Media: Evidence from 5A Scenic Areas in China., , and . ISPRS Int. J. Geo Inf., 11 (9): 492 (2022)A multi-sensor fusion framework with tight coupling for precise positioning and optimization., , , , , and . Signal Process., (April 2024)Improve Session-Based Recommendation with Triplet Mining and Dynamic Perturbations Graph Neural Networks., , , , , , , , and . Int. J. Pattern Recognit. Artif. Intell., 37 (6): 2350012:1-2350012:17 (May 2023)Adaptive heterogeneous comprehensive learning particle swarm optimization with history information and dimensional mutation., , and . Multim. Tools Appl., 82 (7): 9785-9817 (March 2023)Newton's Method for the Ellipsoidal lp Norm Facility Location Problem.. International Conference on Computational Science (1), volume 3991 of Lecture Notes in Computer Science, page 8-15. Springer, (2006)A Note on the Simplex Method for 2-Dimensional Second-Order Cone Programming.. International Conference on Computational Science (1), volume 3991 of Lecture Notes in Computer Science, page 124-131. Springer, (2006)Multi-Scale Local Spatial Binary Patterns for Content-Based Image Retrieval., , , and . AMT, volume 8210 of Lecture Notes in Computer Science, page 423-432. Springer, (2013)Non-Interactive Verifiable Secret Sharing for Monotone Circuits., , , and . AFRICACRYPT, volume 9646 of Lecture Notes in Computer Science, page 225-244. Springer, (2016)