Author of the publication

Machine Learning Algorithm for a Link Adaptation strategy in a Vehicular Ad hoc Network.

, and . Inteligencia Artif., 26 (72): 146-159 (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Sumbwanyambe, Mbuyu
add a person with the name Sumbwanyambe, Mbuyu
 

Other publications of authors with the same name

A quadri-dimensional approach for poor performance prioritization in mobile networks using Big Data., and . J. Big Data, (2019)Using Neural Network and Levenberg-Marquardt Algorithm for Link Adaptation Strategy in Vehicular Ad Hoc Network., and . IEEE Access, (2023)Securing IoT Devices against Differential-Linear (DL) Attack Used on Serpent Algorithm., and . Future Internet, 14 (2): 55 (2022)Preventing Differential Cryptanalysis Attacks Using a KDM Function and the 32-Bit Output S-Boxes on AES Algorithm Found on the Internet of Things Devices., and . Cryptogr., 6 (1): 11 (2022)Machine Learning Algorithm for a Link Adaptation strategy in a Vehicular Ad hoc Network., and . Inteligencia Artif., 26 (72): 146-159 (May 2023)An Application of the Khumbelo Function on the Camellia Algorithm to Prevent Attacks in IoT Devices., and . IEEE Access, (2023)Using the Muthavhine Function to Modify Skipjack Algorithm to Prevent LC and DC Attacks on IoT Devices., and . IEEE Access, (2024)Optimal pricing of telecomm services in a developing country: A game theoretical approach., , and . AFRICON, page 1-6. IEEE, (2011)Liberalization, regulation and privatization (LRP): Telecommunication reform challenges in Zambia., and . ICIN, page 202-206. IEEE, (2011)A Selective Image Encryption Scheme Based on 2D DWT, Henon Map and 4D Qi Hyper-Chaos., and . IEEE Access, (2019)