Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Erratum to: Detecting fraudulent labeling of rice samples using computer vision and fuzzy knowledge., , , , , and . Multimedia Tools Appl., 76 (23): 24705-24706 (2017)Parallel query execution over encrypted data in database-as-a-service (DaaS)., , , , , , , and . The Journal of Supercomputing, 75 (4): 2269-2288 (2019)A Privacy Preserving three-factor authenticated key agreement protocol for client-server environment., , , , and . J. Ambient Intelligence and Humanized Computing, 10 (2): 661-680 (2019)IoT-Based Big Data: From Smart City towards Next Generation Super City Planning., , , and . Int. J. Semantic Web Inf. Syst., 13 (1): 28-47 (2017)Multilevel Data Processing Using Parallel Algorithms for Analyzing Big Data in High-Performance Computing., , , , , and . International Journal of Parallel Programming, 46 (3): 508-527 (2018)Implications of deep learning for the automation of design patterns organization., , , , , , , and . J. Parallel Distrib. Comput., (2018)Smartbuddy: defining human behaviors using big data analytics in social internet of things., , , and . IEEE Wireless Commun., 23 (5): 68-74 (2016)An efficient divide-and-conquer approach for big data analytics in machine-to-machine communication., , and . Neurocomputing, (2016)Content Based Image Retrieval by Using Color Descriptor and Discrete Wavelet Transform., , , , , , and . J. Medical Systems, 42 (3): 44:1-44:12 (2018)Privacy by Architecture Pseudonym Framework for Delay Tolerant Network., , , , , , and . Future Generation Comp. Syst., (2019)