Author of the publication

A Decision Support Model for Wireless Information Management using Mobile Agents.

, , and . Artificial Intelligence and Applications, page 493-498. IASTED/ACTA Press, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A trust management framework for Software Defined Network (SDN) controller and network applications., , , and . Comput. Networks, (2020)Internet of Things and data mining: From applications to techniques and systems., , , , , , and . WIREs Data Mining Knowl. Discov., (2019)Evaluating the Forest Ecosystem through a Semi-Autonomous Quadruped Robot and a Hexacopter UAV., , , , , , and . Sensors, 22 (15): 5497 (2022)Dynamic traffic forecasting and fuzzy-based optimized admission control in federated 5G-open RAN networks., , , and . Neural Comput. Appl., 35 (33): 23841-23859 (November 2023)Toward Software-Defined Networking-Based IoT Frameworks: A Systematic Literature Review, Taxonomy, Open Challenges and Prospects., , , , , , and . IEEE Access, (2022)Real-time IoT Urban Road Traffic Data Monitoring using LoRaWAN., , , and . IOT, page 20:1-20:8. ACM, (2019)Detection of JavaScript Injection Eavesdropping on WebRTC communications., , , , and . WoWMoM, page 541-547. IEEE, (2022)Dynamically Reconfigurable Slice Allocation and Admission Control within 5G Wireless Networks., , and . VTC Spring, page 1-7. IEEE, (2019)NOMA-Based Resource Allocation and Mobility Enhancement Framework for IoT in Next Generation Cellular Networks., , , , , and . IEEE Access, (2019)Analysis of Security Overhead in Broadcast V2V Communications., , , and . SAFECOMP Workshops, volume 11699 of Lecture Notes in Computer Science, page 251-263. Springer, (2019)