Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparative Study on Energy Consumption in Dynamic Window Secured Implicit Geographic Forwarding Routing Protocol., and . J. Comput. Sci., 10 (9): 1600-1607 (2014)An Energy Aware Distributed Clustering Algorithm Using Fuzzy Logic for Wireless Sensor Networks with Non-uniform Node Distribution., , , and . Wireless Personal Communications, 84 (1): 395-419 (2015)An efficient HCCA scheduler for video streaming with QoS support., , , and . ANT/SEIT, volume 109 of Procedia Computer Science, page 116-123. Elsevier, (2017)Effective Black Hole Attacks in MANETs., , , and . J. Comput. Sci., 9 (12): 1722-1733 (2013)Effective mining on large databases for intrusion detection., , , , and . ISBAST, page 204-207. IEEE, (2014)Locust Inspired Algorithm for Cloudlet Scheduling in Cloud Computing Environments., , , and . Sensors, 21 (21): 7308 (2021)Compare and measure selfishness detection (CMSD) mechanism: Promptness and accuracy., , , and . ICUFN, page 851-856. IEEE, (2015)Recharge-as-Reward Mechanism to Incentivize Cooperative Nodes in Mobile Ad Hoc Networks., , , , and . LCN, page 535-538. IEEE Computer Society, (2016)Impact of the Deafness Problem on Clock Synchronization in a Wireless Sensor Network., , , , , and . MEDES, page 127-132. ACM, (2014)Two-level QoS-aware frame-based downlink resources allocation for RT/NRT services fairness in LTE networks., , , and . Telecommun. Syst., 66 (3): 357-375 (2017)