Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utilizing a Bluetooth remote lock system for a smartphone., , , and . Pervasive Mob. Comput., (2015)An Enhanced Java-Based Mobile Device Theft Response System., , , , , and . IMIS, page 41-46. IEEE Computer Society, (2015)Design and Implementation of Location-Based SNS Smartphone Application for the Disabled Population., , , and . IMIS, page 365-370. IEEE Computer Society, (2012)An Accounting Ledger System Using the Hyperledger Fabric-Based Blockchain., , , and . IMIS, volume 1195 of Advances in Intelligent Systems and Computing, page 65-72. Springer, (2020)A Remote Lock System Using Bluetooth Communication., , , and . IMIS, page 441-446. IEEE Computer Society, (2014)A computer remote control system based on speech recognition technologies of mobile devices and wireless communication technologies., , , , and . Comput. Sci. Inf. Syst., 11 (3): 1001-1016 (2014)A Wireless Body Sensor Network and Its Applications: Rehearsal with a Smartphone., , , and . IMIS, page 415-418. IEEE Computer Society, (2016)A Remote Computer Control System Using Speech Recognition Technologies of Mobile Devices., , , , , and . IMIS, page 595-600. IEEE Computer Society, (2013)A real-time location-based SNS smartphone application for the disabled population., , , and . Comput. Sci. Inf. Syst., 10 (2): 747-765 (2013)Anomaly Teletraffic Intrusion Detection Systems on Hadoop-Based Platforms: A Survey of Some Problems and Solutions., , , and . NBiS, page 766-770. IEEE Computer Society, (2012)