Author of the publication

Development and Evaluation of an Attendance Tracking System Using Smartphones with GPS and NFC.

, , , , , , , and . Appl. Artif. Intell., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient time slot allocation algorithm in wireless networks., , and . WCNIS, page 322-328. IEEE, (2010)Adaptive Load Balancing of a Cellular CDMA Systems Considering Non-uniform Traffic Distributions., and . HiPC, volume 3296 of Lecture Notes in Computer Science, page 60-70. Springer, (2004)The Reliability of Detection in Wireless Sensor Networks: Modeling and Analyzing., , , and . EUC, volume 4808 of Lecture Notes in Computer Science, page 432-443. Springer, (2007)An admission control algorithm for CDMA networks., , and . ICON, page 647-652. IEEE, (2003)Maximization of Network Survival Time in the Event of Intelligent and Malicious Attacks., , and . ICC, page 1722-1726. IEEE, (2008)Backhaul and Routing Assignments with End-to-End QoS Constraints for Wireless Mesh Networks., , , and . Wireless Personal Communications, 53 (2): 211-233 (2010)An On-Board Equipment and Blockchain-Based Automobile Insurance and Maintenance Platform., , , and . BWCCA, volume 159 of Lecture Notes in Networks and Systems, page 223-232. Springer, (2020)The top load balanced forest routing in mesh networks., and . CCNC, page 468-472. IEEE, (2006)Minimum-Cost Multicast Routing for Multi-Layered Multimedia Distribution., and . MMNS, volume 3271 of Lecture Notes in Computer Science, page 102-114. Springer, (2004)A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks., , and . CIS (1), page 411-416. IEEE Computer Society, (2008)