Author of the publication

TRM-IoT: A trust management model based on fuzzy reputation for internet of things.

, , , , , and . Comput. Sci. Inf. Syst., 8 (4): 1207-1228 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A genetic approach on cross-layer optimization for cognitive radio wireless mesh network under SINR model., , and . Ad Hoc Networks, (2015)Generative Model for Heterogeneous Inference., , , , and . CoRR, (2018)Energy-Balanced Density Control to Avoid Energy Hole for Wireless Sensor Networks., , , and . IJDSN, (2012)Sentiment Contagion Based on the Modified SOSa-SPSa Model., , , and . Comput. Math. Methods Medicine, (2016)Availability Analysis and Optimization in CoMP and CA-enabled HetNets., , , , and . IEEE Trans. Commun., 65 (6): 2438-2450 (2017)Measuring and Localizing Individual Bites Using a Sensor Augmented Plate During Unrestricted Eating for the Aging Population., , , , , and . IEEE J. Biomed. Health Informatics, 24 (5): 1509-1518 (2020)Energy Efficient Resource Allocation for MSCA Enabled CoMP in HetNets., , , , and . IEEE Trans. Veh. Technol., 71 (3): 2965-2978 (2022)Real-time indoor localization using smartphone magnetic with LSTM networks., , , , , and . Neural Comput. Appl., 33 (16): 10093-10110 (2021)Separation and Recognition of Electroencephalogram Patterns Using Temporal Independent Component Analysis., , , , and . Int. J. Pattern Recognit. Artif. Intell., 29 (1): 1550001:1-1550001:15 (2015)AC4E: An Access Control Model for Emergencies of Mission-Critical Cyber-Physical Systems., , and . KSII Trans. Internet Inf. Syst., 6 (9): 2052-2072 (2012)