Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

5G D2D Networks: Techniques, Challenges, and Future Prospects., , , , , , and . IEEE Syst. J., 12 (4): 3970-3984 (2018)A Secure Communication for Maritime IoT Applications Using Blockchain Technology., , , , and . DCOSS, page 244-251. IEEE, (2020)Internet of Things: Security vulnerabilities and challenges., , and . ISCC, page 180-187. IEEE Computer Society, (2015)Fuzzy Explicit Marking for Congestion Control in Differentiated Services Networks., , , , and . ISCC, page 312-319. IEEE Computer Society, (2003)Fuzzy Logic Congestion Control in TCP/IP Tandem Networks., and . ISCC, page 123-129. IEEE Computer Society, (2006)Key issues for the design and development of mobile commerce services and applications., , , , , , and . Int. J. Mob. Commun., 3 (3): 303-323 (2005)On the efficient use of multiple channels by single-receiver clients in wireless data broadcasting., , , , and . Int. J. Commun. Syst., 27 (3): 513-520 (2014)Fuzzy Logic Control in Communication Networks., and . Foundations of Computational Intelligence (2), volume 202 of Studies in Computational Intelligence, Springer, (2009)Multihop Stability Analysis for Linear Adaptive Vehicular Networks., , and . IWCMC, page 1121-1126. IEEE, (2018)Received signal strength for randomly distributed molecular nanonodes., , , , and . NANOCOM, page 1:1-1:6. ACM, (2017)