Author of the publication

Effective data gathering protocol in WSN-UAV employing priority-based contention window adjustment scheme.

, , , , , and . GLOBECOM Workshops, page 1475-1480. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Knowledge Circulation Framework for Flexible Multimedia Communication Services., , and . IEICE Trans. Inf. Syst., 88-D (9): 2059-2066 (2005)A New Specification Environment for Communication Systems Based on Specification Reuse by the Application of Case Based Reasoning., , , and . IEICE Trans. Inf. Syst., 78-D (10): 1269-1281 (1995)An Intelligent Prediction Based Approach for Mobility Tracking in PCN., , and . International Conference on Internet Computing (1), page 528-534. CSREA Press, (2001)Effects of Encoding Bit Rates on User Level QoS for Video Streaming., , , , , and . EuroIMSA, page 41-46. IASTED/ACTA Press, (2005)Development of a Monitoring System Based on Power Consumption., , , , , , and . NBiS, volume 7 of Lecture Notes on Data Engineering and Communications Technologies, page 363-372. Springer, (2017)Integrated Support Environment for Concurrent Process Calculi., , and . PODC, page 395. ACM, (1994)An Efficient Flow Control Approach For TCP Over Wireless Networks., , and . Journal of Circuits, Systems, and Computers, 13 (2): 341-360 (2004)"Digital-Ji-in": A Framework for Sustainable Digital Identification Records Based on A Peer-to-peer Network., , , , , , , , and . CSCWD, page 1281-1286. IEEE, (2021)Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files., , , , , , , and . NBiS, volume 1036 of Advances in Intelligent Systems and Computing, page 305-316. Springer, (2019)A growing network that optimizes between undertraining and overtraining., , , and . ICNN, page 1116-1120. IEEE, (1995)