Author of the publication

Designing a Secure Blockchain-Based Supply Chain Management Framework.

, , , , and . J. Comput. Inf. Syst., 63 (3): 592-607 (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A study on Chinese consumers' concern about books on online bookstores., , and . ICUIMC, page 61. ACM, (2013)The Adoption of Mobile Games in China: An Empirical Study., , and . ICISO, volume 426 of IFIP Advances in Information and Communication Technology, page 368-377. Springer, (2014)Set-based approach in mining sequential patterns., , , and . ISCIS, page 218-223. IEEE, (2009)A Repository Architecture for Business Process Characterizing Models., and . PoEM, volume 68 of Lecture Notes in Business Information Processing, page 162-176. Springer, (2010)A Web-based Hypertext Learning State Space Model and Learning Control.. IMSA, page 92-96. IASTED/ACTA Press, (2002)High-Performance Wireless Piezoelectric Sensor Network for Distributed Structural Health Monitoring., , , and . IJDSN, 12 (3): 3846804:1-3846804:16 (2016)Fog Computing Based Traffic and Car Parking Intelligent System., , and . ICA3PP (2), volume 11945 of Lecture Notes in Computer Science, page 365-380. Springer, (2019)Heuristic based approach to clustering and its time critical applications., , , and . IRI, page 37-42. IEEE Systems, Man, and Cybernetics Society, (2010)Data Quality Aware Task Allocation Under a Feasible Budget in Mobile Crowdsensing., , , and . IWQoS, page 1-2. IEEE, (2018)Reporting and analyzing alternative clustering solutions by employing multi-objective genetic algorithm and conducting experiments on cancer data., , , , , , , , , and 2 other author(s). Knowl. Based Syst., (2014)