Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BMRC: A Bitmap-Based Maximum Range Counting Approach for Temporal Data in Sensor Monitoring Networks., , , , , and . Sensors, 17 (9): 2051 (2017)Malaria Vulnerability Map Mobile System Development Using GIS-Based Decision-Making Technique., , and . Mob. Inf. Syst., (2018)Virtually Zero Delay Interaction Between Online Game Players Using Kalman Filter-Based Dead Reckoning with Density and Distance Gain Control Adaptation., and . Int. J. Softw. Eng. Knowl. Eng., 29 (8): 1091-1101 (2019)A Combining Method for Wireless Protocol Conformance Testing: A Empirical Case., , and . Wirel. Commun. Mob. Comput., (2021)Early Detection of Hemorrhagic Stroke Using a Lightweight Deep Learning Neural Network Model., , , and . Traitement du Signal, 38 (6): 1727-1736 (2021)FSOD4RSI: Few-Shot Object Detection for Remote Sensing Images via Features Aggregation and Scale Attention., , , , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2024)Further Improved Remote User Authentication Scheme., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (6): 1426-1433 (2011)Improvements on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards., and . IEICE Trans. Inf. Syst., 95-D (10): 2393-2400 (2012)An Enhanced Security Protocol for VANET-Based Entertainment Services., and . IEICE Trans. Commun., 95-B (7): 2245-2256 (2012)Guest editorial: Edge computing., , and . Comput. Sci. Inf. Syst., (2020)