Author of the publication

Wireless network access selection scheme for heterogeneous multimedia traffic.

, , , and . IET Networks, 2 (4): 214-223 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CacheLoc: Leveraging CDN Edge Servers for User Geolocation., , and . SecureComm (2), volume 336 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 22-40. Springer, (2020)Security Breach Possibility with RSS-Based Localization of Smart Meters Incorporating Maximum Likelihood Estimator., , , and . ICSEng, volume 366 of Advances in Intelligent Systems and Computing, page 133-139. Springer, (2014)Application of FVIKOR method for prioritization of wireless networks with multiple attributes., , , and . PIMRC, page 915-920. IEEE, (2012)A fuzzy MADM ranking approach for vertical mobility in next generation hybrid networks., , , and . ICUMT, page 262-267. IEEE, (2012)Application of fuzzy TOPSIS for weighting the system attributes in overlay networks., , , and . APNOMS, page 1-6. IEEE, (2012)A Fuzzy Preprocessing Module for Optimizing the Access Network Selection in Wireless Networks., , , and . Adv. Fuzzy Syst., (2013)Vehicle to Pedestrian Systems: Survey, Challenges and Recent Trends., , , and . IEEE Access, (2022)A fuzzy extension of VIKOR for target network selection in heterogeneous wireless environments., , , and . Phys. Commun., (2013)Wireless network access selection scheme for heterogeneous multimedia traffic., , , and . IET Networks, 2 (4): 214-223 (2013)Smart augmented reality glasses in cybersecurity and forensic education., , and . ISI, page 279-281. IEEE, (2016)