Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

QoS Enhancement of AODV Routing for MBANs., , , and . Wirel. Pers. Commun., 116 (2): 1379-1406 (2021)Towards decision support model for ubiquitous agriculture., , and . ICDIM, page 308-313. IEEE, (2013)An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules., , , and . Multim. Tools Appl., 75 (1): 1-23 (2016)Machine Learning Based Prediction of Reference Evapotranspiration (ET0) Using IoT., , , , , and . IEEE Access, (2022)A Toolkit for Prototype Implementation of E-Governance Service System Readiness Assessment Framework., , and . HCI (22), volume 9752 of Lecture Notes in Computer Science, page 259-270. Springer, (2016)Proactive Security Mechanism and Design for Firewall., , , and . J. Information Security, 2 (3): 122-130 (2011)Building a Smart University Using RFID Technology., , and . CSSE (5), page 641-644. IEEE Computer Society, (2008)978-0-7695-3336-0.Performance Analysis of Classification Algorithms on Birth Dataset., , , , , , and . IEEE Access, (2020)Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules., , , , and . Multim. Tools Appl., 78 (7): 9355-9382 (2019)IoT-Enabled Smart Socket., , , , , and . Wirel. Pers. Commun., 116 (2): 1151-1169 (2021)