2022
A Discrete Chimp Optimization Algorithm for Minimizing Tardy/Lost Penalties on a Single Machine Scheduling Problem.
IEEE Access, 2022

2019
Blockchain for tracking serial numbers in money exchanges.
Intell. Syst. Account. Finance Manag., 2019

Identification and Assessment of Software Design Pattern Violations.
CoRR, 2019

Trackify: A Robust System For Preserving Money Transactions.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019

2017
Recognizing Driving Behavior and Road Anomaly using Smartphone Sensors.
Int. J. Ambient Comput. Intell., 2017

2016
Interactive Gestures for Liver Angiography Operation.
Proceedings of the Digital Human Modeling: Applications in Health, Safety, Ergonomics and Risk Management, 2016

2015
Authentication systems: principles and threats.
Comput. Inf. Sci., 2015

Single Trial Authentication with Mental Password Writing.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

An Experimental Comparison Between Seven Classification Algorithms for Activity Recognition.
Proceedings of the 1st International Conference on Advanced Intelligent System and Informatics, 2015

2014
ROSS: A rapid protein structure alignment algorithm.
Proceedings of the IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology, 2014

2012
MDSA: Modified Distributed Storage Algorithm for Wireless Sensor Networks
CoRR, 2012

2011
Study of the effects of pairwise key pre-distribution scheme on the performance of a topology control protocol.
Proceedings of the Distributed Computing in Sensor Systems, 2011

A Pairwise Key Pre-distribution Scheme Based on Prior Deployment Knowledge.
Proceedings of the Third International Conference on Computational Intelligence, 2011

2008
Enhanced "ULTRA GRIDSEC": Enhancing high Performance Symmetric Key Cryptography Schema using pure Peer To Peer Computational Grid Middleware (HIMAN).
Proceedings of the 3rd IEEE International Conference on System of Systems Engineering, 2008

ULTRA GRIDSEC: Peer-to-Peer Computational Grid Middleware Security Using High Performance Symmetric Key Cryptography.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008