Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated System for Malicious Node Discovery and Self-destruction in Wireless Sensor Networks., , , , , and . CoRR, (2018)Identification of Distributed Parameter Systems based on Multivariable Estimation and Wireless Sensor Networks.. WINSYS, page 92-95. INSTICC Press, (2008)Cities of the Future: Employing Wireless Sensor Networks for Efficient Decision Making in Complex Environments., , , , , , , , and . CoRR, (2018)A 2D chaotic path planning for mobile robots accomplishing boundary surveillance missions in adversarial conditions., and . Commun. Nonlinear Sci. Numer. Simul., 19 (10): 3617-3627 (2014)Efficiency improvement in multi-sensor wireless network based estimation algorithms for distributed parameter systems with application at the heat transfer., and . EURASIP J. Adv. Signal Process., (2013)Frequency Control for Ultrasonic Piezoelectric Transducers, based on the Movement Current.. ICINCO-SPSMC, page 194-199. INSTICC Press, (2008)Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique., , , , and . ICNS, page 83. IEEE Computer Society, (2007)Knowledge based System for Reliable Perimeter Protection using Sensor Networks., , , , and . WINSYS, page 51-56. INSTICC Press, (2007)Self-destruction Procedure for Cluster-tree Wireless Sensor Networks., , , , , and . WINSYS, page 63-67. INSTICC Press, (2009)Ensemble based sensing anomaly detection in wireless sensor networks., and . Expert Syst. Appl., 39 (10): 9087-9096 (2012)