Author of the publication

Weather based playlist generation in mobile devices using hash map

, , and . 2017 International Conference on IoT and Application (ICIOT), page 1--7. IEEE, (May 2017)
DOI: 10.1109/iciota.2017.8073645

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Complete k-ary trees and Hamming graphs., and . Australas. J Comb., (2009)A novel scheme for secure group communication in multicast network., and . Int. J. Secur. Networks, 10 (2): 65-75 (2015)Embedding complete ternary trees into hypercubes., and . Discuss. Math. Graph Theory, 28 (3): 463-476 (2008)Magic labeling on interval-valued intuitionistic fuzzy graphs., , , and . J. Intell. Fuzzy Syst., 33 (6): 3999-4006 (2017)Secured two factor authentication, graph based replication and encryption strategy in cloud computing., and . Multim. Tools Appl., 82 (11): 16105-16125 (May 2023)Spectrally Efficient Cognitive Relaying for IoT Networks., , and . Wirel. Pers. Commun., 122 (4): 3433-3443 (2022)Signature Based Vulnerability Detection Over Wireless Sensor Network for Reliable Data Transmission., , , , and . Wirel. Pers. Commun., 87 (2): 431-442 (2016)Graph-Based Replication and Two Factor Authentication in Cloud Computing., and . Comput. Syst. Sci. Eng., 45 (3): 2869-2883 (2023)Disjoint paths in hypercubes with prescribed origins and lengths., , and . Int. J. Comput. Math., 87 (8): 1692-1708 (2010)Leader-following consensus of multi-agent systems with sampled-data control and looped functionals., and . Math. Comput. Simul., (2022)