Author of the publication

Efficient application mapping approach based on grey wolf optimization for network on chip.

, , , , , , and . J. Netw. Comput. Appl., (October 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GCACS-IoD: A certificate based generic access control scheme for Internet of drones., , , , , and . Comput. Networks, (2021)Next-Generation Internet of Things (IoT): Opportunities, Challenges, and Solutions., , , and . Sensors, 21 (4): 1174 (2021)LTE or LAA: Choosing Network Mode for My Mobile Phone in 5G Network., , , and . VTC Spring, page 1-4. IEEE, (2017)Evading Virus Detection Using Code Obfuscation., , , and . FGIT, volume 6485 of Lecture Notes in Computer Science, page 394-401. Springer, (2010)MagWi: Benchmark Dataset for Long Term Magnetic Field and Wi-Fi Data Involving Heterogeneous Smartphones, Multiple Orientations, Spatial Diversity and Multi-Floor Buildings., , , , , and . IEEE Access, (2021)Smartphone Sensors for Indoor Positioning., , , and . Sensors, 23 (8): 3811 (2023)Fault-Tolerant Network-On-Chip Router Architecture Design for Heterogeneous Computing Systems in the Context of Internet of Things., , , , , , and . Sensors, 20 (18): 5355 (2020)The Future of Healthcare Internet of Things: A Survey of Emerging Technologies., , , , and . IEEE Commun. Surv. Tutorials, 22 (2): 1121-1167 (2020)TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration., , , , , , and . Sensors, 20 (14): 3945 (2020)Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment., , , , , and . ACM Trans. Internet Techn., 21 (3): 78:1-78:19 (2021)