كمالي سيد حسين |
Performance modeling of distributed load balancing algorithm using neural networks |
International journal of computer science and telecommunications |
3 |
- |
2012 |
|
Design novel AQM schemes by using artificial intelligence technologies |
The journal of mathematics and computer science |
2 |
436-447 |
2011 |
|
A complication of some well-known results in renorming theory |
The journal of mathematics and computer science |
2 |
495-514 |
2011 |
|
A priority scheduler based qos for dynamic source routing protocol using fuzzy logic in mobil ad-hoc network |
The journal of mathematics and computer science |
3 |
329-338 |
2011 |
كمالي سيد حسين |
Using identity-based secret public keys cryptography for heuristic security analyses in grid computing |
The journal of mathematics and computer science |
3 |
357-375 |
2011 |
|
common fixed point thorem in probabilistic quasi-metric spaces |
The Journal of Nonlinear Sciences and its Applications |
1 |
31-35 |
2008 |
دوميري گنجي داوود |
Application of HE'S homotopy perturbation method to solve the kdv,kawahara and chdbur equations |
far east journal of applied mathematics |
|
273-288 |
2006 |