A Discrete Chimp Optimization Algorithm for Minimizing Tardy/Lost Penalties on a Single Machine Scheduling Problem.
IEEE Access, 2022
Blockchain for tracking serial numbers in money exchanges.
Intell. Syst. Account. Finance Manag., 2019
Identification and Assessment of Software Design Pattern Violations.
CoRR, 2019
Trackify: A Robust System For Preserving Money Transactions.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019
Recognizing Driving Behavior and Road Anomaly using Smartphone Sensors.
Int. J. Ambient Comput. Intell., 2017
Interactive Gestures for Liver Angiography Operation.
Proceedings of the Digital Human Modeling: Applications in Health, Safety, Ergonomics and Risk Management, 2016
Authentication systems: principles and threats.
Comput. Inf. Sci., 2015
Single Trial Authentication with Mental Password Writing.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
An Experimental Comparison Between Seven Classification Algorithms for Activity Recognition.
Proceedings of the 1st International Conference on Advanced Intelligent System and Informatics, 2015
ROSS: A rapid protein structure alignment algorithm.
Proceedings of the IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology, 2014
MDSA: Modified Distributed Storage Algorithm for Wireless Sensor Networks
CoRR, 2012
Study of the effects of pairwise key pre-distribution scheme on the performance of a topology control protocol.
Proceedings of the Distributed Computing in Sensor Systems, 2011
A Pairwise Key Pre-distribution Scheme Based on Prior Deployment Knowledge.
Proceedings of the Third International Conference on Computational Intelligence, 2011
Enhanced "ULTRA GRIDSEC": Enhancing high Performance Symmetric Key Cryptography Schema using pure Peer To Peer Computational Grid Middleware (HIMAN).
Proceedings of the 3rd IEEE International Conference on System of Systems Engineering, 2008
ULTRA GRIDSEC: Peer-to-Peer Computational Grid Middleware Security Using High Performance Symmetric Key Cryptography.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008