Author of the publication

Security Completeness Problem in Wireless Sensor Networks.

, , and . Intelligent Automation & Soft Computing, 21 (2): 235-250 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chord Based Identity Management for e-Healthcare Cloud Applications., , , and . SAINT, page 391-394. IEEE Computer Society, (2010)Energy savings in processor based on prediction technique., , , , and . ICOIN, page 147-150. IEEE Computer Society, (2016)Semantic transformation model for clinical documents in big data to support healthcare analytics., and . ICDIM, page 99-102. IEEE, (2015)A Comprehensive Middleware Architecture for Context-Aware Ubiquitous Computing Systems., , , and . ACIS-ICIS, page 251-256. IEEE Computer Society, (2005)Accurate multi-criteria decision making methodology for recommending machine learning algorithm., , and . Expert Syst. Appl., (2017)Energy-Efficient Routing Algorithms Based on OVSF Code and Priority in Clustered Wireless Sensor Networks., , , , , , , and . IJDSN, (2013)A Hybrid Swapping Scheme Based On Per-Process Reclaim for Performance Improvement of Android Smartphones (August 2018)., , , , and . IEEE Access, (2018)Context-aware grading of quality evidences for evidence-based decision-making., , , and . Health Informatics Journal, (2019)Evaluating real-life performance of the state-of-the-art in facial expression recognition using a novel YouTube-based datasets., , , , , , , and . Multimedia Tools Appl., 77 (1): 917-937 (2018)General criteria-based clustering method for multi-node computing system., , and . The Journal of Supercomputing, 61 (3): 869-893 (2012)