Author of the publication

Priority based MAC scheme for cognitive radio network: A queuing theory modelling.

, and . WOCN, page 1-5. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance study of a CSMA based multiuser MAC protocol for cognitive radio networks: analysis of channel utilization and opportunity perspective., and . Wireless Networks, 22 (1): 33-47 (2016)Design of secure session key using unique addressing and identification scheme for smart home Internet of Things network., and . Trans. Emerg. Telecommun. Technol., (2021)A comprehensive survey of fake news in social networks: Attributes, features, and detection approaches., , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (6): 101571 (June 2023)A secure authentication scheme for IoT application in smart home., and . Peer-to-Peer Netw. Appl., 14 (1): 420-438 (2021)Multichannel CSMA Based MAC Scheme for Unsaturated Cognitive Radio Networks: Performance Study of the Opportunity and Contention Window., , and . Wireless Personal Communications, 85 (3): 1279-1294 (2015)Analysis of MAC schemes for cognitive radio network: Perfect and imperfect learning modelling., and . WOCN, page 1-6. IEEE, (2013)A Small World Phenomenon Based Greedy Network Model for Robust IoT Network., and . Ad Hoc Sens. Wirel. Networks, 48 (3-4): 221-247 (2020)Adaptive Energy Detection Based Solution for Fronthaul Problem in C-RAN., and . Wireless Personal Communications, 103 (4): 2743-2755 (2018)A privacy and session key based authentication scheme for medical IoT networks., and . Comput. Commun., (2021)A survey on the applications of machine learning in wireless sensor networks., , , and . Int. J. High Perform. Comput. Netw., 16 (4): 197-220 (2020)