Author of the publication

E-ITRC Protocol with Long & Adjustable Range on Underwater Acoustic Sensor Network.

, , , , , and . AINA Workshops (2), page 665-672. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preliminary Study for Designing a Novel Vein-Visualizing Device., , , and . Sensors, 17 (2): 304 (2017)Artificial Intelligence Vision-Based Monitoring System for Ship Berthing., , , and . IEEE Access, (2020)Robust IoT Malware Detection and Classification Using Opcode Category Features on Machine Learning., , , , and . IEEE Access, (2023)Enhanced Cascaded Genetic Fuzzy System for Counterfeit Banknote Detection., , and . NAFIPS, volume 1337 of Advances in Intelligent Systems and Computing, page 277-287. Springer, (2020)A Simple Protocol for Dominating Set Construction in Mobile Ad Hoc Networks., , and . ICPP Workshops, page 35-41. IEEE Computer Society, (2003)Path Planning for Multi-agent Jellyfish Removal Robot System JEROS and Experimental Tests., , , , , and . DARS, volume 112 of Springer Tracts in Advanced Robotics, page 299-310. Springer, (2014)Automated Configuration Parameter Classfication Model for Hive Query Plan on the Apache Yarn., , , and . BCD, page 77-83. IEEE, (2019)Folding Rays: a Bimanual Occluded Target Interaction Technique., , and . ISMAR-Adjunct, page 716-717. IEEE, (2023)Effective Boundary Value Problem Solver via Bézier Functions., , and . Symmetry, 13 (5): 736 (2021)Scalable and Multifaceted Search and Its Application for Binary Malware Files., , and . IEEE Access, (2021)