Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unital Design Based Sink Location Service for Wireless Sensor Networks., , , and . IEEE Access, (2018)An Efficient Component for Designing Signed Reverse Converters for a Class of RNS Moduli Sets of Composite Form 2k, 2P-1., , , and . IEEE Trans. VLSI Syst., 25 (1): 48-59 (2017)Highly reliable architecture using the 80/20 rule in cloud computing datacenters., , and . Future Generation Comp. Syst., (2017)On the (im)possibility of receiving security beyond 2l using an l-bit PRNG: the case of Wang et. al. protocol., , , , and . IACR Cryptology ePrint Archive, (2015)Performance enhanced model reference adaptive control through switching non-quadratic Lyapunov functions., and . Systems & Control Letters, (2015)Evaluation of users' privacy concerns by checking of their WhatsApp status., , and . Softw., Pract. Exper., 48 (5): 1143-1164 (2018)Area-delay-power-aware adder placement method for RNS reverse converter design., , , , and . LASCAS, page 223-226. IEEE, (2016)Corrigendum to "Preventing Sybil Attacks in P2P File Sharing Networks Based on the Evolutionary Game Model" Information Sciences 470 (2019) 94-108., , , and . Inf. Sci., (2020)Constrained Control of Linear Systems Subject to Combinations of Intersections and Unions of Concave Constraints., , , and . IEEE Control. Syst. Lett., 3 (3): 571-576 (2019)A new clustering-based routing method in the mobile internet of things using a krill herd algorithm., , , and . Clust. Comput., 25 (1): 351-361 (2022)