Author of the publication

Trust estimation of the semantic web using semantic web clustering.

, , and . J. Exp. Theor. Artif. Intell., 29 (3): 537-556 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model., , , and . Inf. Sci., (2019)A new resource allocation method in fog computing via non-cooperative game theory., , , and . J. Intell. Fuzzy Syst., 41 (2): 3921-3932 (2021)Localization of sensor nodes in the Internet of Things using fuzzy logic and learning automata., , and . J. Intell. Fuzzy Syst., 45 (1): 619-635 (2023)Load balancing in join algorithms for skewed data in MapReduce systems., , and . J. Supercomput., 75 (1): 228-254 (2019)Extended array model of star capacity-aware delay-based next controller placement problem for multiple controller failures in software-defined wide area networks., , and . J. Ambient Intell. Humaniz. Comput., 14 (8): 11039-11057 (2023)A novel key pre-distribution scheme based on μ-PBIBD combinatorial design in the resource-constrained IoT network., and . CoRR, (2021)A new method of trust mirroring estimation based on social networks parameters by fuzzy system., , and . Int. J. Mach. Learn. Cybern., 9 (7): 1153-1168 (2018)Using Particle Swarm Optimization for Robot Path Planning in Dynamic Environments with Moving Obstacles and Target., and . EMS, page 60-65. IEEE Computer Society, (2009)Topology Control in MANETs Using the Bayesian Pursuit Algorithm., and . Wireless Personal Communications, 106 (3): 1089-1116 (2019)Boundary query solution using convex hull algorithm., , and . J. Exp. Theor. Artif. Intell., 25 (1): 139-146 (2013)