Author of the publication

A Voronoi Diagram and Q-Learning based Relay Node Placement Method Subject to Radio Irregularity.

, , , , and . ACM Trans. Sens. Networks, 20 (1): 13:1-13:27 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-dimensional optimization for approximate near-threshold computing., , , , and . Frontiers Inf. Technol. Electron. Eng., 21 (10): 1426-1441 (2020)Health Assessment of Cooling Fan Bearings Using Wavelet-Based Filtering., , , and . Sensors, 13 (1): 274-291 (2013)Multispectral image compression methods for improvement of both colorimetric and spectral accuracy., , , and . J. Electronic Imaging, 25 (4): 043026 (2016)Characteristics of ESD protection devices operated under elevated temperatures., , , , , , and . Microelectron. Reliab., (2016)面向点云的三维物体识别方法综述 (Survey of 3D Object Recognition for Point Clouds)., , , , and . 计算机科学, 44 (9): 11-16 (2017)Optimal Energy Efficient Power Allocation With User Fairness for Uplink MC-NOMA Systems., , , and . IEEE Wirel. Commun. Lett., 8 (4): 1133-1136 (2019)A Connectivity-Aware Approximation Algorithm for Relay Node Placement in Wireless Sensor Networks., , and . CoRR, (2015)An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model., , , , and . IEEE Trans. Ind. Informatics, 16 (3): 2063-2071 (2020)Interval-Valued Hesitant Fuzzy Stochastic Decision-Making Method Based on Regret Theory., and . Int. J. Fuzzy Syst., 22 (4): 1091-1103 (2020)A Leakage-Resilient FPGA-Based IP Identity Authentication Protocol., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 287-292. IEEE, (2018)