Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prediction revision strategies for data transmission in wireless sensor networks., , and . CIT, page 827-832. IEEE Computer Society, (2008)Mitigating Collisions in Saturated Wireless Network with Receiver Token Ring., , and . SMC, page 4919-4923. IEEE, (2013)Node localisation in wireless sensor network based on self-organising isometric embedding., , and . Enterprise IS, 2 (3): 259-273 (2008)Cluster Based Location-Aided Routing Protocol for Large Scale Mobile Ad Hoc Networks., , , , and . IEICE Trans. Inf. Syst., 92-D (5): 1103-1124 (2009)A Review of Deep Learning Methods for Photoplethysmography Data., , , , , , and . CoRR, (2024)Dynamic Threshold Scheme Used in Directed Diffusion., , and . ICESS, volume 3820 of Lecture Notes in Computer Science, page 220-229. Springer, (2005)A SPT Based Topology Control Algorithm for Wireless Sensor Network., , and . SKG, page 282-285. IEEE Computer Society, (2007)Cluster Based Location-Aware Routing Protocol for Large Scale Heterogeneous MANET., , , and . IMSCCS, page 366-373. IEEE Computer Society, (2007)An adaptive distributed localisation in wireless sensor network., , and . Enterprise IS, 3 (2): 117-132 (2009)Ancient Chinese zither (guqin) music recovery with support vector machine., , , , and . ACM Journal on Computing and Cultural Heritage, 3 (2): 5:1-5:12 (2010)