Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Local Stable Mechanism for Particle Swarm Optimization Algorithm., , , , and . ICICA (2), volume 308 of Communications in Computer and Information Science, page 466-473. Springer, (2012)Throughput Prediction Using Recurrent Neural Network Model., , , , and . GCCE, page 107-108. IEEE, (2018)HTMLPhish: Enabling Accurate Phishing Web Page Detection by Applying Deep Learning Techniques on HTML Analysis., , and . CoRR, (2019)Accuracy evaluations of human moving pattern using communication quality based on machine learning., , , and . GCCE, page 1-2. IEEE, (2017)Real-time classification via sparse representation in acoustic sensor networks., , , , , and . SenSys, page 21:1-21:14. ACM, (2013)Research on the Recovery Technology of Floating-point Parameters in Binary Translation., , , and . IMECS, page 1163-1168. Newswood Limited, (2007)A Pseudo LEACH Algorithm for Wireless Sensor Networks., , and . IMECS, page 1366-1370. Newswood Limited, (2007)An Optimal Torque Distribution Strategy for Four-Motorized-Wheel Electric Vehicle Considering Energy Conversation., , , and . IEEE Access, (2020)Look Before You Leap: Detecting Phishing Web Pages by Exploiting Raw URL And HTML Characteristics., , and . CoRR, (2020)QoS Constrained VoIP Scheduling in 1xEV-DO., and . ICC, page 86-90. IEEE, (2007)