Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poster: Distributed and Privacy Preserving Routing of Connected Vehicles to Minimize Congestion., , and . Networking, page 640-642. IEEE, (2020)WiFi based Multi-User Gesture Recognition., , and . IEEE Trans. Mob. Comput., 20 (3): 1242-1256 (2021)Distributed and Privacy Preserving Routing of Connected Vehicles to Minimize Congestion., , and . MASS, page 220-228. IEEE, (2020)Recognizing Human Gestures Using Ambient Light., , and . DASC/PiCom/CBDCom/CyberSciTech, page 420-428. IEEE, (2020)Poster: A framework to secure IoT networks against network layer attacks., , , and . Networking, page 1-2. IEEE, (2019)Per-Flow Packet Loss Measurement without Probing., and . ICCCN, page 1-10. IEEE, (2023)Novel method for image security system based on improved SCAN method and pixel rotation technique., and . J. Inf. Secur. Appl., (2018)Using of Cement Kiln Dust as a Mineral Admixture to Produce Sustainable Self-Compacting Concrete., and . DeSE, page 299-302. IEEE, (2013)Detection Copy-Move Forgery in Image Via Quaternion Polar Harmonic Transforms., , , and . KSII Trans. Internet Inf. Syst., 13 (8): 4005-4025 (2019)Design Random Number Generator Utilizing The Futoshiki Puzzle.. J. Inf. Hiding Multim. Signal Process., 10 (1): 178-186 (2019)