Author of the publication

A Cooperation-Based Routing Algorithm in Mobile Opportunistic Networks.

, , , , , and . IIKI, page 160-166. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Computing Resource Adjustment in Edge Computing Satellite Networks., , , , and . SimuTools, volume 295 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 135-145. Springer, (2019)DSWIPT Scheme for Cooperative Transmission in Downlink NOMA System., , , , and . SimuTools, volume 295 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 567-577. Springer, (2019)Bisecting K-Means Based Fingerprint Indoor Localization., , , , , and . SimuTools, volume 295 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1-12. Springer, (2019)A traffic anomaly detection approach in communication networks for applications of multimedia medical devices., , , , and . Multimedia Tools Appl., 75 (22): 14281-14305 (2016)QoS constraints-based energy-efficient model in cloud computing networks for multimedia clinical issues., , , and . Multimedia Tools Appl., 75 (22): 14307-14328 (2016)Spectral Matrix Decomposition-Based Motion Artifacts Removal in Multi-Channel PPG Sensor Signals., , , , and . IEEE Access, (2016)Empirical Analysis and Modeling of the Activity Dilemmas in Big Social Networks., , , , , and . IEEE Access, (2017)Statistical Resolution Limit Analysis of Two Closely Spaced Signal Sources Using Rao Test., , , and . IEEE Access, (2017)Energy-efficient cognitive access approach to convergence communications., , , and . SCIENCE CHINA Information Sciences, 57 (4): 1-12 (2014)A transform domain-based anomaly detection approach to network-wide traffic., , , and . J. Network and Computer Applications, (2014)