Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure edge computing: An architectural approach and industrial use case., and . Internet Technol. Lett., (2018)ICCBP: Inter Cluster Chain Based Protocol with Cross Layer Interaction for Randomly Deployed Wireless Sensor Networks., , , , , and . Ad Hoc Sens. Wirel. Networks, 36 (1-4): 257-284 (2017)An online marking system conducive to learning., , , , , and . J. Intell. Fuzzy Syst., 31 (5): 2463-2471 (2016)AUV-Aided Energy-Efficient Clustering in the Internet of Underwater Things., , and . TGCN, 3 (4): 1132-1141 (2019)Cyber Physical System: Architecture, applications and research challenges., , and . Wireless Days, page 1-5. IEEE, (2013)An Improved Push-based Protocol for Critical Data Dissemination in Vehicular Named Data Networks., , and . J. Inf. Sci. Eng., 36 (4): 837-849 (2020)Introduction to the Special Section on Artificial Intelligence for Next Generation Industrial Cyber-Physical Systems., , , , and . IEEE Syst. J., 17 (4): 5070-5072 (December 2023)Towards energy efficient duty cycling in underwater wireless sensor networks., , , and . Multim. Tools Appl., 78 (21): 30057-30079 (2019)Multimedia streaming in information-centric networking: A survey and future perspectives., , , , and . Comput. Networks, (2017)Named-Data-Networking-Based ITS for Smart Cities., , , and . IEEE Commun. Mag., 55 (1): 105-111 (2017)