Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IoT cloud-based framework using of smart integration to control the spread of COVID-19., , , , , , and . ICC, page 1-5. IEEE, (2021)Cultivate Smart and Healthy Ageing., , , , , , and . HealthyIoT, volume 456 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 136-147. Springer, (2022)Trust and relationship building in electronic commerce., , , and . Internet Res., 11 (4): 322-332 (2001)Enabling trust formation within agent-mediated virtual environments., , , and . Virtual Reality, 5 (3): 149-159 (2000)Designing Silicon Brains using LLM: Leveraging ChatGPT for Automated Description of a Spiking Neuron Array., , and . CoRR, (2024)UAV-Assisted RSUs for V2X Connectivity Using Voronoi Diagrams in 6G+ Infrastructures., , , , and . IEEE Trans. Intell. Transp. Syst., 24 (12): 15855-15865 (December 2023)Enhanced Redundant Scheme Based on Weighted Cluster-Head Selection for Critical 6G Infrastructures., , , , , and . GLOBECOM (Workshops), page 1448-1453. IEEE, (2022)Secure Two-Way Communications Between UAVs and Control Center in IoV 5G Communication., , , , , and . CAMAD, page 184-189. IEEE, (2022)On the Performance Evaluation of a Novel Offloading-Based Energy Conservation Mechanism for Wireless Devices., , , , , and . MONAMI, volume 141 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 179-191. Springer, (2014)Towards an optimized security approach to IoT devices with confidential healthcare data exchange., , , , , , and . Multim. Tools Appl., 80 (20): 31435-31449 (2021)