Author of the publication

A Packet Forwarding Protocol in Coal Mine Opportunistic Networks.

, , , , and . J. Commun., 11 (3): 333-339 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Construction and enumeration of a special class of transitive relations., , and . Ars Comb., (2014)Operation models and operation management: a framework for the de-manufacturing system., , and . SMC (6), page 5085-5090. IEEE, (2004)Identifying Important Nodes in Heterogenous Networks., , and . AAAI (Late-Breaking Developments), volume WS-13-17 of AAAI Workshops, AAAI, (2013)Conceptual modeling for customized XML schemas., , , , , and . Data Knowl. Eng., 54 (1): 57-76 (2005)Fundamentals of RTOS-Based Digital Controller Implementation.. Handbook of Networked and Embedded Control Systems, Birkhäuser, (2005)Ecological Optimization Performance of An Irreversible Quantum Otto Cycle Working with an Ideal Fermi Gas., , , , , and . Open Syst. Inform. Dynam., 13 (1): 55-66 (2006)Thermodynamic Analysis on Thermoacoustic Self-Excited Oscillation., , , , and . Open Syst. Inform. Dynam., 10 (4): 391-402 (2003)Experimental validation on the integrated design and control of a parallel robot.. Robotica, 24 (2): 173-181 (2006)Rich Media Retrieval in an Object XML Framework: A Case Study with Flash Movies Using Structural Join Index Hierarchy., , and . COMPSAC Workshops, page 51-52. IEEE Computer Society, (2004)0-7695-2209-2.Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless Networks., , , and . TrustCom/BigDataSE/ISPA (1), page 104-110. IEEE, (2015)