Author of the publication

Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Networks

, and . ACEEE International Journal of Information Technology, 3 (3): 9 (September 2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Location and Trust Based Replica Detection in Wireless Sensor Networks., and . Wireless Personal Communications, 102 (4): 3303-3321 (2018)Optimal bandwidth allocation for multimedia mobile networks using particle swarm optimization., and . Mobility Conference, page 238-243. ACM, (2007)Secure Data Forwarding against Denial of Service Attack Using Trust Based Evolutionary Game., and . VTC Spring, page 31-35. IEEE, (2008)A feedback analyzer system for interval valued responses on cloud services., , and . Soft Comput., 28 (5): 4457-4469 (March 2024)A Multichannel Convolutional Neural Network for Multilabel Sentiment Classification Using Abilify Oral User Reviews., , , , and . Informatica (Slovenia), (2023)C-Load Power control Protocol-Cross-Layer Design of a Network Layer Load Power control Protocol in Wireless Ad Hoc Networks., and . J. Comput. Sci., 10 (3): 508-520 (2014)Multiple Sequence Alignment Using Parallel Genetic Algorithms., , and . SEAL, volume 1585 of Lecture Notes in Computer Science, page 130-137. Springer, (1998)Multipath Power Sensitive Routing Protocol for Mobile Ad Hoc Networks., , , and . WONS, volume 2928 of Lecture Notes in Computer Science, page 171-183. Springer, (2004)Design and Optimization of Test Solutions for Core-based System-On-Chip Benchmark Circuits Using Genetic Algorithm., and . World Congress on Engineering, page 249-254. Newswood Limited, (2007)Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Networks, and . ACEEE International Journal of Information Technology, 3 (3): 9 (September 2013)