From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An efficient technique for geocast region holes in underwater sensor networks and its performance evaluation., , и . Simul. Model. Pract. Theory, 19 (9): 2102-2116 (2011)Efficient data acquisition in underwater wireless sensor Ad Hoc networks., , , и . IEEE Wirel. Commun., 16 (6): 70-78 (2009)T_CAFE: A Trust based Security approach for Opportunistic IoT., , и . IET Commun., 13 (20): 3463-3471 (2019)Best fit power weighted difference method for fog node selection in smart cities., , , и . IET Commun., 14 (19): 3448-3457 (2020)An Efficient and Secure Data Forwarding Mechanism for Opportunistic IoT., и . Wirel. Pers. Commun., 118 (1): 217-237 (2021)A Comprehensive Review on Edge Computing: Focusing on Mobile Users., , , , , и . Honoring Professor Mohammad S. Obaidat, том 289 из Lecture Notes in Networks and Systems, стр. 121-152. Springer, (2022)A Machine Learning-Based Protocol for Efficient Routing in Opportunistic Networks., , , , , и . IEEE Syst. J., 12 (3): 2207-2213 (2018)An Analysis of Theoretical Network Communication Speedup Using Multiple Fungible Paths., , , и . IMIS, том 177 из Lecture Notes on Data Engineering and Communications Technologies, стр. 68-77. Springer, (2023)Using Honeynodes along with Channel Surfing for Defense against Jamming Attacks in Wireless Networks., , , и . ICSNC, стр. 197-201. IEEE Computer Society, (2008)Markovian Model Based Channel Allocation in Cognitive Radio Networks., , , и . DSDIS, стр. 478-482. IEEE Computer Society, (2015)