Author of the publication

A Hybrid Information-Based Smartphone Indoor-Position Approach.

, , , , and . IMIS, volume 1195 of Advances in Intelligent Systems and Computing, page 56-64. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The simulation of an emotional robot implemented with fuzzy logic., , , and . Soft Comput., 18 (9): 1729-1743 (2014)A Multi-layer Secure Prevention Scheme for Improving e-Commerce Security., , and . IMIS, page 505-510. IEEE Computer Society, (2014)The Study of MME Pool Management and Fault Tolerance in 5G Networks with SDN Controllers., and . IMIS, volume 773 of Advances in Intelligent Systems and Computing, page 585-595. Springer, (2018)MIH-Based Congestion Control with Seamless Handover in Untrusted Networks., and . IMIS, volume 612 of Advances in Intelligent Systems and Computing, page 502-510. Springer, (2017)A Secure ECC-based Electronic Medical Record System., , , , , and . J. Internet Serv. Inf. Secur., 4 (1): 47-57 (2014)High Performance Grid Computing: Challenges and Opportunities of High Speed Networking., , and . BWCCA, volume 25 of Lecture Notes on Data Engineering and Communications Technologies, page 597-610. Springer, (2018)Fuzzy-Based Dynamic Bandwidth Allocation System., , and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 911-920. Springer, (2005)A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks., , and . ARES, volume 6908 of Lecture Notes in Computer Science, page 255-270. Springer, (2011)A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core., , , , and . BWCCA, page 360-365. IEEE, (2013)Secure Mobile Instant Messaging key exchanging protocol with One-Time-Pad substitution transposition cryptosystem., , , , and . INFOCOM Workshops, page 980-984. IEEE, (2016)