关注
Fisseha Teju Wedaj
Fisseha Teju Wedaj
University of Science and Technology of China , Adama Science and Technology University
在 mail.ustc.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Improved reversible data hiding in JPEG images based on new coefficient selection strategy
FT Wedaj, S Kim, HJ Kim, F Huang
EURASIP Journal on Image and Video Processing 2017, 1-11, 2017
582017
Toras: Trustworthy load-balanced opportunistic routing for asynchronous duty-cycled wsns
MUF Qaisar, X Wang, A Hawbani, A Khan, A Ahmed, FT Wedaj, S Ullah
IEEE Systems Journal 17 (2), 2259-2270, 2022
122022
Torp: load balanced reliable opportunistic routing for asynchronous wireless sensor networks
MUF Qaisar, X Wang, A Hawbani, A Khan, A Ahmed, FT Wedaj
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
122020
Reco: On-demand recharging and data collection for wireless rechargeable sensor networks
FT Wedaj, A Hawbani, X Wang, MUF Qaisar, W Othman, SH Alsamhi, ...
IEEE Transactions on Green Communications and Networking, 2023
92023
TBDD: Territory-Bound Data Delivery for Large-Scale Mobile Sink Wireless Sensor Networks
FT Wedaj, A Hawbani, X Wang, SH Alsamhi, L Zhao, MUF Qaisar
IEEE Internet of Things Journal 10 (22), 19937-19948, 2023
62023
ISAC-Facilitated Optimal On-demand Mobile Charging Scheme for IoT-based WRSNs
MUF Qaisar, Z Sun, F Liu, C Liu, G Han, FT Wedaj
Proceedings of the 30th Annual International Conference on Mobile Computing …, 2024
2024
Coverage Hole Aware Data Routing for Mobile Sink Wireless Sensor Networks
FT Wedaj, A Hawbani, X Wang, HM Al-Gunid, G Yilma, MUF Qaisar
2024 IEEE 14th International Conference on Electronics Information and …, 2024
2024
Lossless Data Hiding in JPEG Image based on [B, n] Hamming code Scenario
WF Teju, HJ Kim
대한전자공학회 학술대회, 1403-1406, 2015
2015
Genping Zhao 118
A Hawbani, A Zeng, A Li, A Liu, AY Liu, A Liu, B Xiujun, B Li, B Lin, B Gao, ...
系统目前无法执行此操作,请稍后再试。
文章 1–9