An Overview of 5G Wireless Cellular Technologies
暂无分享,去创建一个
Farhan Ullah | Usman | Waqas Ali | Amna Mehmood | Bilal
[1] Shahzad Khan,et al. Applications, limitations, and improvements in visible light communication systems , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).
[2] Fazlullah Khan,et al. An Innovative Approach to Investigate Various Software Testing Techniques and Strategies , 2016 .
[3] Shahzad Khan,et al. Performance improvement in wireless sensor and actor networks based on actor repositioning , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).
[4] Xiangjian He,et al. A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[5] Farman Ullah,et al. Survey: Dealing Non-Functional Requirements at Architecture Level , 2016 .
[6] Kenji Nakagawa,et al. Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).
[7] Muhammad Safdar,et al. Request-Response Interaction Model in Constrained Networks , 2016 .
[8] Xiangjian He,et al. A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..
[9] Farman Ullah,et al. A Survey: Embedded Systems Supporting By Different Operating Systems , 2016, ArXiv.
[10] Deepak Puthal,et al. ADCS: An adaptive data collection scheme in vehicular networks using 3G/LTE , 2014, 2014 International Conference on Connected Vehicles and Expo (ICCVE).
[11] Hashim Ali,et al. Enhanced and Effective Learning through Mobile Learning an Insight into Students Perception of Mobile Learning at University Level , 2016 .
[12] Nazia Azim,et al. EEC : Evaluation of Energy Consumption in Wireless Sensor Networks , 2016 .
[13] Hanafy M. Ali,et al. COMPARATIVE STUDY OF ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS , 2018 .
[14] B. P. S. Sahoo,et al. Cloud Computing Features, Issues, and Challenges: A Big Picture , 2015, 2015 International Conference on Computational Intelligence and Networks.
[15] Abdelkrim Haqiq,et al. Secure Communication and Routing Architecture in Wireless Sensor Networks , 2014 .
[16] Xiangjian He,et al. PASCCC: Priority-based application-specific congestion control clustering protocol , 2014, Comput. Networks.
[17] Deepak Puthal,et al. Cross-layer architecture for congestion control in Vehicular Ad-hoc Networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).
[18] Fahim Arif,et al. Fairness improvement in long chain multihop wireless ad hoc networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).
[19] Nazia Azim,et al. Offsite 2-Way Data Replication towards Improving Data Refresh Performance , 2016 .
[20] F. Khan,et al. Dual head clustering scheme in wireless sensor networks , 2012, 2012 International Conference on Emerging Technologies.
[21] Iftikhar Ahmad,et al. A New Robust Video Watermarking Technique Using H.264/AAC Codec Luma Components Based On DCT , 2016 .
[22] Sameerchand Pudaruth,et al. PEOPLE FACTORS IN AGILE SOFTWARE DEVELOPMENT AND PROJECT MANAGEMENT , 2012 .
[23] Fazlullah Khan. Fairness and throughput improvement in multihop wireless ad hoc networks , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).
[24] Kenji Nakagawa,et al. B-8-10 Cooperative Spectrum Sensing Techniques in Cognitive Radio Networks , 2012 .
[25] Muhammad Babar,et al. Applications and Challenges Faced by Internet of Things - A Survey , 2016 .
[26] Sher Afzal Khan,et al. Delay and throughput performance improvement in wireless sensor and actor networks , 2015, 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW).
[27] Xiangjian He,et al. PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..