Author of the publication

An adaptive solar-aware framework and strategy for outdoor deployment of WSN.

, , , , , and . Comput. Networks, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Temporal Action Detection Methods Based on Deep Learning., , and . Int. J. Pattern Recognit. Artif. Intell., 36 (3): 2252005:1-2252005:24 (2022)Pinyin-to-Chinese conversion on sentence-level for domain-specific applications using self-attention model., , , and . Multim. Syst., 28 (2): 375-386 (2022)Slope Stability Analysis Based on Leader Dolphins Herd Algorithm and Simplified Bishop Method., , , and . IEEE Access, (2021)A Lossless Convergence Method for Reducing Data Fragments on WSN., , , , , and . IEEE Access, (2019)Improving cervical cancer classification with imbalanced datasets combining taming transformers with T2T-ViT., , , , and . Multim. Tools Appl., 81 (17): 24265-24300 (2022)CURE-SMOTE algorithm and hybrid algorithm for feature selection and parameter optimization based on random forests., and . BMC Bioinform., 18 (1): 169:1-169:18 (2017)Single Failure Recovery Method for Erasure Coded Storage System with Heterogeneous Devices., , , and . IEICE Trans. Inf. Syst., 102-D (9): 1865-1869 (2019)You Are How You Behave - Spatiotemporal Representation Learning for College Student Academic Achievement., , , and . J. Comput. Sci. Technol., 35 (2): 353-367 (2020)Fracture constitutive study of spring-beam model applied to slurry anchor connection., , , and . Int. J. Wirel. Mob. Comput., 26 (2): 107-114 (2024)Secure Two-Way Fiber-Optic Time Transfer Against Sub-ns Asymmetric Delay Attack With Clock Model-Based Detection and Mitigation Scheme., , , , , , , , , and 8 other author(s). IEEE Trans. Instrum. Meas., (2023)