Author of the publication

An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications.

, , and . Appl. Soft Comput., 13 (4): 1978-1996 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications., , and . Appl. Soft Comput., 13 (4): 1978-1996 (2013)Feature extraction process: A phishing detection approach., , and . ISDA, page 331-335. IEEE, (2013)A novel intrusion detection framework for Wireless Sensor Networks., , and . IAS, page 350-353. IEEE, (2011)Security Threats and Challenges to IoT and its Applications: A Review., , , and . FMEC, page 301-305. IEEE, (2020)Analysis of Metaheuristics Feature Selection Algorithm for Classification., , and . HIS, volume 1375 of Advances in Intelligent Systems and Computing, page 214-222. Springer, (2020)Application of Knowledge-oriented Convolutional Neural Network For Causal Relation Extraction In South China Sea Conflict Issues., , , and . CRC, page 1-7. IEEE, (2021)Malay Word Stemmer to Stem Standard and Slang Word Patterns on Social Media., , , and . DMBD, volume 9714 of Lecture Notes in Computer Science, page 391-400. Springer, (2016)CFaaS: bilaterally agreed evidence collection., , and . J. Cloud Comput., (2018)A Review on Challenging Issues in Arabic Sentiment Analysis., , and . J. Comput. Sci., 12 (9): 471-481 (2016)An Adaptive Intrusion Detection Scheme for Cloud Computing., and . Int. J. Swarm Intell. Res., 10 (4): 53-70 (2019)