Author of the publication

A performance analysis on packet scheduling schemes based on an exponential rule for real-time traffic in LTE.

, , , and . EURASIP J. Wirel. Commun. Netw., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Benchmarking full version of GureKDDCup, UNSW-NB15, and CIDDS-001 NIDS datasets using rolling-origin resampling., , , , and . Inf. Secur. J. A Glob. Perspect., 31 (5): 544-565 (2022)Toward forecasting future day air pollutant index in Malaysia., , , and . J. Supercomput., 77 (5): 4813-4830 (2021)Stacked deep analytic model for human activity recognition on a UCI HAR database., , , , and . F1000Research, (2021)Neighbourhood preserving discriminant embedding in face recognition., , and . J. Vis. Commun. Image Represent., 20 (8): 532-542 (2009)Regularized locality preserving discriminant embedding for face recognition., , and . Neurocomputing, 77 (1): 156-166 (2012)Locality Regularization Embedding for face verification., , and . Pattern Recognit., 48 (1): 86-102 (2015)A performance analysis on packet scheduling schemes based on an exponential rule for real-time traffic in LTE., , , and . EURASIP J. Wirel. Commun. Netw., (2015)Palmprint Verification with Moments., , , and . WSCG, page 325-332. (2004)Localized Temporal Representation in Human Action Recognition., , and . ICNCC, page 261-266. ACM, (2018)Score level fusion approach in dynamic signature verification based on hybrid wavelet-Fourier transform., , , and . Secur. Commun. Networks, 7 (7): 1067-1078 (2014)