Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Routing Protocol for Heterogeneous Hierarchical Wireless Multimedia Sensor Networks., , and . Wireless Personal Communications, 60 (3): 559-569 (2011)Area-efficient convolutional deinterleaver for mobile TV receiver., , and . ACM Trans. Embed. Comput. Syst., 12 (2): 28:1-28:12 (2013)The prediction of network efficiency in the smart grid., , , , and . Electron. Commer. Res., 13 (3): 347-356 (2013)Fuzzy-Based Filtering Solution Selection Method For Dynamic Sensor Networks1., , , and . Intell. Autom. Soft Comput., 16 (4): 579-592 (2010)Research on android malware permission pattern using permission monitoring system., , and . Multimedia Tools Appl., 75 (22): 14807-14817 (2016)Job partition and allocation using the prediction model in non-dedicated heterogeneous wireless network environments., , , , and . IET Commun., 3 (5): 764-771 (2009)Simulation Model Design of a Security System Based on a Policy-Based Framework., and . Simulation, 79 (9): 515-527 (2003)Modeling and Simulation of Distributed Security Models., , and . International Conference on Computational Science, volume 2660 of Lecture Notes in Computer Science, page 809-818. Springer, (2003)Modeling of Energy-efficient Applicable Routing Algorithm in WSN., , , and . JDCTA, 4 (5): 13-22 (2010)Distributed Security Agent Modeling in the Policy-Based Networking., and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 782-786. Springer, (2004)