Author of the publication

Performance analysis of LTE downlink system using relay-based selective transmission.

, , , and . Personal and Ubiquitous Computing, 18 (3): 543-551 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks., , , and . ISPA Workshops, volume 4331 of Lecture Notes in Computer Science, page 917-926. Springer, (2006)Improved Structure Management of Gateway Firewall Systems for Effective Networks Security., , and . ISCIS, volume 2869 of Lecture Notes in Computer Science, page 1076-1083. Springer, (2003)Resource Reservation and Allocation Based on Direction Prediction for Handoff in Mobile Multimedia Networks., , and . International Conference on Computational Science, volume 2660 of Lecture Notes in Computer Science, page 555-565. Springer, (2003)HOIDS-Based Detection Method of Vicious Event in Large Networks., , and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 998-1005. Springer, (2006)Multi-level Protection Building for Virus Protection Infrastructure., , and . International Conference on Computational Science, volume 3036 of Lecture Notes in Computer Science, page 631-634. Springer, (2004)Recent trends on mobile computing and future networks., , and . Personal and Ubiquitous Computing, 18 (3): 489-491 (2014)Location and Direction Estimation-Based Resource Reservation Scheme for the Handoff in Micro Cellular Multimedia Networks., , and . Wireless Personal Communications, 94 (2): 187-208 (2017)A feature selection approach to find optimal feature subsets for the network intrusion detection system., and . Clust. Comput., 19 (1): 325-333 (2016)Performance Improvement Scheme of NIDS through Optimizing Intrusion Pattern Database., , , and . ISCIS, volume 2869 of Lecture Notes in Computer Science, page 1098-1105. Springer, (2003)Mobility Management Scheme for Reducing Location Traffic Cost in IMT-2000 Networks., , and . ICCSA (2), volume 2668 of Lecture Notes in Computer Science, page 50-59. Springer, (2003)