Author of the publication

Node status detection and information diffusion in router network using Scale-free network.

, , , and . INC, page 95-105. Plymouth University, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forward and Inverse Kinematics Seamless Matching Using Jacobian., , , and . CoRR, (2014)Augmented Reality for Learning of Children and Adolescents With Autism Spectrum Disorder (ASD): A Systematic Review., , , , , , and . IEEE Access, (2020)Capturing the real customer experience based on the parameters in the call detail records., , , , and . Multim. Tools Appl., 80 (18): 28439-28461 (2021)A Knowledge-Based Sense Disambiguation Method to Semantically Enhanced NL Question for Restricted Domain., and . Inf., 12 (11): 452 (2021)A comparative analysis of resource allocation schemes for real-time services in high-performance computing systems., , , , , , and . Int. J. Distributed Sens. Networks, 16 (8): 155014772093275 (2020)Technology based learning analysis of CBCS model at KKU - Case study of College of Computer Science King Khalid University, Saudi Arabia., , , and . Int. J. Emerg. Technol. Learn., 8 (3): 8-12 (2013)Barriers Effecting Successful Implementation of E-Learning in Saudi Arabian Universities., , , , and . Int. J. Emerg. Technol. Learn., 12 (6): 94-107 (2017)Process Hierarchy for GSD Based User-Centric Requirements Elicitation Frameworks., and . ICIIS, page 528-533. IEEE, (2020)A Novel RE Teams Selection Process For User-Centric Requirements Elicitation Frameworks Based On Big-Five Personality Assessment Model., and . ICIIS, page 522-527. IEEE, (2020)Securing XML Web Services by using a Proxy Web Service Model., and . SCSS (1), page 410-415. Springer, (2007)