Author of the publication

Modeling energy consumption in next-generation wireless access-over-WDM networks with hybrid power sources.

, , , , and . Math. Comput. Model., 58 (5-6): 1389-1404 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A MapReduce-based modified Grey Wolf optimizer for QoS-aware big service composition., , , and . Concurr. Comput. Pract. Exp., (2020)A GRASP-based network re-optimization strategy for improving RWA in multi-constrained optical transport infrastructures., , and . Comput. Commun., 33 (15): 1809-1822 (2010)Deep Learning Forecasting for Supporting Terminal Operators in Port Business Development., , , , and . Future Internet, 14 (8): 221 (2022)An energy-aware dynamic RWA framework for next-generation wavelength-routed networks., , , , , and . Comput. Networks, 56 (10): 2420-2442 (2012)An intelligent security architecture for distributed firewalling environments., , , and . J. Ambient Intell. Humaniz. Comput., 4 (2): 223-234 (2013)Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures., , , , and . J. Supercomput., 71 (5): 1620-1641 (2015)Automated detection and containment of worms and viruses into heterogeneous networks: a simple network immune system., and . Int. J. Wirel. Mob. Comput., 2 (1): 47-58 (2007)Selective Redundancy Removal: A Framework for Data Hiding.. Future Internet, 2 (1): 30-40 (2010)An Interdisciplinary Review of Smart Vehicular Traffic and Its Applications and Challenges., , and . J. Sens. Actuator Networks, 8 (1): 13 (2019)An asynchronous covert channel using spam., , , and . Comput. Math. Appl., 63 (2): 437-447 (2012)