Author of the publication

An effective approach for managing power consumption in cloud computing infrastructure.

, , , , and . J. Comput. Sci., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Depth error concealment based on decision making., , , and . ICSIPA, page 193-196. IEEE, (2013)A new cooperative spectrum sensing scheme based on discrete cosine transform., , , and . ISTT, page 108-111. IEEE, (2016)Probability-based opportunity dynamic adaptation (PODA) of contention window for home M2M networks., , , , and . J. Netw. Comput. Appl., (2019)A Survey and Taxonomy on Medium Access Control Strategies for Cooperative Communication in Wireless Networks: Research Issues and Challenges., , , , and . IEEE Commun. Surv. Tutorials, 18 (4): 2493-2521 (2016)Feature Drift Aware for Intrusion Detection System Using Developed Variable Length Particle Swarm Optimization in Data Stream., , , and . IEEE Access, (2023)6G Wireless Communications Networks: A Comprehensive Survey., , , , , , , , , and . IEEE Access, (2021)Global Communications Newsletter., , , , , , , , , and 8 other author(s). IEEE Commun. Mag., 55 (1): 13-16 (2017)Heuristic Resource Allocation Algorithm for Controller Placement in Multi-Control 5G Based on SDN/NFV Architecture., , , , , and . IEEE Access, (2021)Normalized Advancement Based Totally Opportunistic Routing Algorithm With Void Detection and Avoiding Mechanism for Underwater Wireless Sensor Network., , , , and . IEEE Access, (2020)On the authentication and re-authentication protocols in LTE-WLAN interworking architecture., , , , and . Trans. Emerg. Telecommun. Technol., (2017)