Author of the publication

Two-Phase Security Protection for the Internet of Things Object.

, , and . J. Inf. Process. Syst., 14 (6): 1431-1437 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Widyawan,
add a person with the name Widyawan,
 

Other publications of authors with the same name

Adaptive Motion Model for a Smart Phone Based Opportunistic Localization System., , and . MELT, volume 5801 of Lecture Notes in Computer Science, page 50-65. Springer, (2009)Detection of Anomalous Vital Sign of Elderly Using Hybrid K-Means Clustering and Isolation Forest., , , , and . TENCON, page 913-918. IEEE, (2018)A Backtracking Particle Filter for fusing building plans with PDR displacement estimates., , and . WPNC, page 207-212. IEEE, (2008)Segmentation and Classification of Cervical Cells Using Deep Learning., , , , , , and . IEEE Access, (2019)Contempo: A home care model to enhance the wellbeing of elderly people., , , , , and . BHI, page 472-475. IEEE, (2014)Multi-User Low Intrusive Occupancy Detection., , , and . Sensors, 18 (3): 796 (2018)Anomaly detection for elderly home care., , , , , and . Int. J. Bus. Intell. Data Min., 16 (4): 418-444 (2020)A game-theoretic framework for joint base station and resource selection in LTE heterogeneous networks., , , and . APCC, page 447-452. IEEE, (2013)A Routing Optimization Based on Cross-Layer Design for Wireless Multimedia Sensor Networks (WMSNs)., , , and . J. Comput. Sci., 13 (10): 572-580 (2017)Internet of Things (IoT) Framework for Granting Trust among Objects., , and . J. Inf. Process. Syst., 13 (6): 1613-1627 (2017)