Author of the publication

Communications requirements, video streaming, communications links and networked UAVs

, , , , , , , , and . Imaging and Sensing for Unmanned Aircraft Systems, Volume 2: Deployment and Applications, 2, Institution of Engineering and Technology, UK, 1 edition, (April 2020)
DOI: 10.1049/pbce120g_ch6

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formalization and Quantitative Analysis of Controllability on Internet Information Security., , , and . IJWA, 2 (2): 109-120 (2010)Language Feature Mining for Music Emotion Classification via Supervised Learning from Lyrics., , , , , and . ISICA, volume 5370 of Lecture Notes in Computer Science, page 426-435. Springer, (2008)Limit Theorems for Continuous-Time Branching Flows., and . J. Appl. Probab., 51 (2): 317-332 (2014)Sentiment classification technology based on Markov logic networks., , , and . New Rev. Hypermedia Multim., 22 (3): 243-256 (2016)Optimization strategy of Hadoop small file storage for big data in healthcare., , , and . J. Supercomput., 72 (10): 3696-3707 (2016)Multi-metric domain adaptation for unsupervised transfer learning., , , , and . IET Image Process., 14 (12): 2780-2790 (2020)An intelligent network user behavior analysis system based on collaborative Markov model and distributed data processing., , , , , , and . CSCWD, page 221-228. IEEE, (2013)Structural and functional correlates of motor imagery BCI performance: Insights from the patterns of fronto-parietal attention network., , , , , , , , , and 2 other author(s). NeuroImage, (2016)ERSChain: Towards secure and flexible educational resource sharing using consortium blockchain and revocable ciphertext-policy attribute-based encryption., , , and . Concurr. Comput. Pract. Exp., (2024)Efficient intrusion detection toward IoT networks using cloud-edge collaboration., , , , , , and . Comput. Networks, (June 2023)