Author of the publication

Throughput and Delay Analysis of Slotted MACA-BI MAC Protocol for Mobile Ad Hoc Network.

, and . J. Next Gener. Inf. Technol., 1 (3): 12-20 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Deployment with Optimal Connectivity in Wireless Sensor Networks., and . IJMCMC, 7 (2): 1-21 (2016)Performance modeling of slotted MACA-BI MAC protocol for mobile ad hoc networks., and . ICIS, volume 403 of ACM International Conference Proceeding Series, page 860-862. ACM, (2009)Coverage Hole Detection and Healing to Enhance Coverage and Connectivity in 3D Spaces for WSNs: A Mathematical Analysis., and . Wireless Personal Communications, 96 (2): 2863-2876 (2017)Throughput and Delay Analysis of Slotted MACA-BI MAC Protocol for Mobile Ad Hoc Network., and . J. Next Gener. Inf. Technol., 1 (3): 12-20 (2010)Energy-Efficient Deterministic Approach for Coverage Hole Detection in Wireless Underground Sensor Network: Mathematical Model and Simulation., and . Comput., 11 (6): 86 (2022)Modelling of IEEE 802.11 DCF in the presence of hidden nodes., and . Int. J. Wirel. Mob. Comput., 9 (1): 70-77 (2015)Lunar cycle inspired PSO for single machine total weighted tardiness scheduling problem., , and . Evol. Intell., 14 (3): 1355-1366 (2021)Comparative analysis of magnetic induction based communication techniques for wireless underground sensor networks., , , , and . PeerJ Comput. Sci., (2022)A Classification of Misbehavior Detection Schemes for VANETs: A Survey., , and . Wirel. Pers. Commun., 129 (1): 285-322 (March 2023)Throughput Analysis of IEEE 802.11 DCF with Modified Binary Exponential Backoff in Mobile Ad Hoc Networks., and . Int. J. Mob. Comput. Multim. Commun., 2 (3): 61-70 (2010)