Author of the publication

Designing Constrained Trajectory Based on Maximizing Energy Reduction in Large-Scale Wireless Sensor Networks.

, , , , and . IJDSN, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IEEE Access Special Section Editorial: Green Communications and Networking for 5G., , , , and . IEEE Access, (2018)Cost-Efficient Heterogeneous Data Transmission in Software Defined Vehicular Networks., , and . HPCC/CSS/ICESS, page 666-671. IEEE, (2015)A novel background subtraction for intelligent surveillance in wireless network., , and . WCNC, page 3017-3021. IEEE, (2014)Context reasoning using extended evidence theory in pervasive computing environments., , , , and . Future Gener. Comput. Syst., 26 (2): 207-216 (2010)Energy-Efficient Node Selection Algorithms with Correlation Optimization in Wireless Sensor Networks., , , , and . Int. J. Distributed Sens. Networks, (2014)Efficient identity authentication and encryption technique for high throughput RFID system., , , , and . Secur. Commun. Networks, 9 (15): 2581-2591 (2016)Head Pose Estimation Based on Manifold Embedding and Distance Metric Learning., , and . ACCV (1), volume 5994 of Lecture Notes in Computer Science, page 61-70. Springer, (2009)SAMR: A Self-adaptive MapReduce Scheduling Algorithm in Heterogeneous Environment., , , , and . CIT, page 2736-2743. IEEE Computer Society, (2010)An Efficient Collaborative Filtering Approach Using Smoothing and Fusing., , , , and . ICPP, page 558-565. IEEE Computer Society, (2009)On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off between Time and Memory., , and . UIC/ATC, page 613-618. IEEE Computer Society, (2013)