Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

5G D2D Networks: Techniques, Challenges, and Future Prospects., , , , , , and . IEEE Syst. J., 12 (4): 3970-3984 (2018)Fuzzy Explicit Marking for Congestion Control in Differentiated Services Networks., , , , and . ISCC, page 312-319. IEEE Computer Society, (2003)Fuzzy Logic Congestion Control in TCP/IP Tandem Networks., and . ISCC, page 123-129. IEEE Computer Society, (2006)Internet of Things: Security vulnerabilities and challenges., , and . ISCC, page 180-187. IEEE Computer Society, (2015)A Secure Communication for Maritime IoT Applications Using Blockchain Technology., , , , and . DCOSS, page 244-251. IEEE, (2020)Fuzzy explicit marking: A unified congestion controller for Best-Effort and Diff-Serv networks., , and . Comput. Networks, 53 (5): 650-667 (2009)Fuzzy Logic Control in Communication Networks., and . Foundations of Computational Intelligence (2), volume 202 of Studies in Computational Intelligence, Springer, (2009)On the efficient use of multiple channels by single-receiver clients in wireless data broadcasting., , , , and . Int. J. Commun. Syst., 27 (3): 513-520 (2014)Multihop Stability Analysis for Linear Adaptive Vehicular Networks., , and . IWCMC, page 1121-1126. IEEE, (2018)Received signal strength for randomly distributed molecular nanonodes., , , , and . NANOCOM, page 1:1-1:6. ACM, (2017)