Author of the publication

Coverage Hole Detection and Healing to Enhance Coverage and Connectivity in 3D Spaces for WSNs: A Mathematical Analysis.

, and . Wireless Personal Communications, 96 (2): 2863-2876 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Deployment with Optimal Connectivity in Wireless Sensor Networks., and . IJMCMC, 7 (2): 1-21 (2016)Performance modeling of slotted MACA-BI MAC protocol for mobile ad hoc networks., and . ICIS, volume 403 of ACM International Conference Proceeding Series, page 860-862. ACM, (2009)Energy-Efficient Deterministic Approach for Coverage Hole Detection in Wireless Underground Sensor Network: Mathematical Model and Simulation., and . Comput., 11 (6): 86 (2022)Throughput and Delay Analysis of Slotted MACA-BI MAC Protocol for Mobile Ad Hoc Network., and . J. Next Gener. Inf. Technol., 1 (3): 12-20 (2010)Coverage Hole Detection and Healing to Enhance Coverage and Connectivity in 3D Spaces for WSNs: A Mathematical Analysis., and . Wireless Personal Communications, 96 (2): 2863-2876 (2017)Modelling of IEEE 802.11 DCF in the presence of hidden nodes., and . Int. J. Wirel. Mob. Comput., 9 (1): 70-77 (2015)Lunar cycle inspired PSO for single machine total weighted tardiness scheduling problem., , and . Evol. Intell., 14 (3): 1355-1366 (2021)Comparative analysis of magnetic induction based communication techniques for wireless underground sensor networks., , , , and . PeerJ Comput. Sci., (2022)A Classification of Misbehavior Detection Schemes for VANETs: A Survey., , and . Wirel. Pers. Commun., 129 (1): 285-322 (March 2023)Localization schemes for Underwater Acoustic Sensor Networks - A Review., , and . Comput. Sci. Rev., (2020)