Author of the publication

Identification of the Optimum Relocalization Time in the Mobile Wireless Sensor Network Using Time-Bounded Relocalization Methodology.

, , , and . IEEE Trans. Veh. Technol., 66 (1): 344-357 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PSO trained Neural Networks for predicting forest fire size: A comparison of implementation and performance., and . IJCNN, page 676-683. IEEE, (2016)Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network., and . SpringSim (CNS), page 8-15. SCS/ACM, (2015)Reliability and Utilization Evaluation of a Cloud Computing System Allowing Partial Failures., , and . IEEE CLOUD, page 936-937. IEEE Computer Society, (2014)Evaluation and design of highly reliable and highly utilized cloud computing systems., , , , and . J. Cloud Comput., (2015)Identification of the Optimum Relocalization Time in the Mobile Wireless Sensor Network Using Time-Bounded Relocalization Methodology., , , and . IEEE Trans. Veh. Technol., 66 (1): 344-357 (2017)Formal Concept Lattice Representations and Algorithms for Hypergraphs., , , , and . CoRR, (2023)Special session - Attracting and supporting military veterans in engineering programs., , , , , , , and . FIE, page 4. IEEE Computer Society, (2011)On Cloud-based Oversubscription., , and . CoRR, (2014)Weighted vote algorithm combination technique for anomaly based Smart Grid Intrusion Detection systems., , and . IJCNN, page 2738-2742. IEEE, (2016)FourD: do developers discuss design? revisited., , and . SWAN@SIGSOFT FSE, page 43-46. ACM, (2016)