Author of the publication

Packet Damage-Resistant Analysis Using a Data Mining Mechanism in Wireless Sensor Networks.

, and . Intelligent Environments, page 176-179. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lossless Data Hiding for Binary Document Images Using n n -Pairs Pattern., , and . ICISC, volume 8949 of Lecture Notes in Computer Science, page 317-327. Springer, (2014)Secure Scalable and Reliable Mobile Multicast with FI-Based Local Group Key., , , and . International Conference on Internet Computing, page 188-194. CSREA Press, (2008)A Scalable Recovery Tree Construction Scheme Considering Spatial Locality of Packet Loss., and . KSII Trans. Internet Inf. Syst., 2 (2): 82-102 (2008)A Fair Transmission Opportunity by Detecting and Punishing the Malicious Wireless Stations in IEEE 802.11e EDCA Network., , , , and . IEEE Syst. J., 5 (4): 486-494 (2011)An object discarding policy with FI systems for cooperative hybrid caching architecture., , , , and . ACM Southeast Regional Conference, page 411-416. ACM, (2008)A buffer management scheme for tree-based reliable multicast using infrequent acknowledgments., and . IPCCC, page 13-20. IEEE, (2004)A heuristic buffer management scheme for tree-based reliable multicast., and . ISCC, page 1123-1128. IEEE Computer Society, (2004)Improving QoS for ECG Data Transmission with Enhanced Admission Control in EDCA-Based WLANs., , , and . GLOBECOM, page 1-5. IEEE, (2011)(N, 1) secret sharing approach based on steganography with gray digital images., , , and . WCNIS, page 325-329. IEEE, (2010)fFTP: a fast file transfer protocol for home N-screen platform., , , and . Personal and Ubiquitous Computing, 22 (1): 143-152 (2018)