Author of the publication

A New Scheme for Indirect Trust Calculation to Resist Bigmouth Attack in Wireless Ad Hoc Network.

, , , , , , , and . CSE, page 248-251. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Analysis of Peasant Household's Credit Behavior., , , , and . ICCS, volume 9 of Procedia Computer Science, page 1228-1233. Elsevier, (2012)A trusted computing environment model in cloud architecture., , , and . ICMLC, page 2843-2848. IEEE, (2010)Towards Analyzing Data to Find Nearest Neighbors.. Int. J. Comput. Their Appl., 20 (3): 158-164 (2013)Minimization of Cogging Torque for V-Type IPMSM by the Asymmetric Auxiliary Slots on the Rotor., , , , and . IEEE Access, (2022)Robust ensemble learning for mining noisy data streams., , , , and . Decis. Support Syst., 50 (2): 469-479 (2011)A Multi-criteria Convex Quadratic Programming model for credit data analysis., , , and . Decis. Support Syst., 44 (4): 1016-1030 (2008)Aircraft Anti-skid Braking Control Based on Reinforcement Learning., , , , , , , and . IEEE Trans. Aerosp. Electron. Syst., 59 (6): 9219-9232 (December 2023)Classification of HIV-I-Mediated neuronal dendritic and synaptic damage using multiple criteria linear programming., , , , , , , , , and 1 other author(s). Neuroinformatics, 2 (3): 303-326 (2004)A binary integer linear program with multi-criteria and multi-constraint levels., and . Comput. Oper. Res., 24 (3): 259-273 (1997)My Early Researches on Fuzzy Set and Fuzzy Logic.. Int. J. Comput. Commun. Control, (2020)