Author of the publication

Deploying Hierarchical Mesh Networks for Supporting Distributed Computing in Industrial Internet of Things.

, , , , and . IEEE Syst. J., 16 (3): 4433-4444 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximation strategy based on the T-product for third-order quaternion tensors with application to color video compression., and . Appl. Math. Lett., (June 2023)Unconstrained minimization of block-circulant polynomials via semidefinite program in third-order tensor space., , and . J. Glob. Optim., 84 (2): 415-440 (2022)A Note on the Nonemptiness and Compactness of Solution Sets of Weakly Homogeneous Variational Inequalities., , and . SIAM J. Optim., 30 (1): 132-148 (2020)Nonemptiness and Compactness of Solution Sets to Generalized Polynomial Complementarity Problems., , and . J. Optim. Theory Appl., 185 (1): 80-98 (2020)T-positive semidefiniteness of third-order symmetric tensors and T-semidefinite programming., , and . Comput. Optim. Appl., 78 (1): 239-272 (2021)Unique solvability of weakly homogeneous generalized variational inequalities., , and . J. Glob. Optim., 80 (4): 921-943 (2021)Nonemptiness and Compactness of Solution Sets to Weakly Homogeneous Generalized Variational Inequalities., , and . J. Optim. Theory Appl., 189 (3): 919-937 (2021)Re-Identification with Consistent Attentive Siamese Networks., , , and . CoRR, (2018)Deep Regression Bayesian Network and Its Applications., , and . CoRR, (2017)GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids., , , and . IEEE Trans. Netw. Sci. Eng., 7 (2): 805-816 (2020)