Author of the publication

Energy efficient with time synchronised and service coverage guarantee in wireless sensor networks.

, , and . Int. J. Commun. Networks Distributed Syst., 21 (1): 56-79 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ArA*summarizer: An Arabic text summarization system based on subtopic segmentation and using an A* algorithm for reduction., , and . Expert Syst. J. Knowl. Eng., (2020)Pruned improved eight-point approximate DCT for image encoding in visual sensor networks requiring only ten additions., , , and . J. Real Time Image Process., 17 (5): 1597-1608 (2020)RFID Authentication Protocols Based on Error-Correcting Codes: A Survey., , , and . Wireless Personal Communications, 96 (1): 509-527 (2017)Analysis of hybrid router-assisted reliable multicast protocols in lossy networks., , and . Int. Arab J. Inf. Technol., 14 (1): 26-34 (2017)Using Screen Brightness to Improve Security in Mobile Social Network Access., , , , , and . IEEE Trans. Dependable Secur. Comput., 15 (4): 621-632 (2018)Security Ontology for Semantic SCADA., and . ICWIT, volume 867 of CEUR Workshop Proceedings, page 179-192. CEUR-WS.org, (2012)UML Modeling and Formal Verification of Control/Data Driven Embedded Systems., and . ICECCS, page 311-316. IEEE Computer Society, (2009)Weaknesses in Two RFID Authentication Protocols., , , and . C2SI, volume 9084 of Lecture Notes in Computer Science, page 162-172. Springer, (2015)An Authentication Protocol Based on Combined RFID-Biometric System RFID-Biometric System, , and . CoRR, (2012)Energy efficient with time synchronised and service coverage guarantee in wireless sensor networks., , and . Int. J. Commun. Networks Distributed Syst., 21 (1): 56-79 (2018)