Gohar Ali
Orcid: 0000-0003-2406-6787
According to our database1,
Gohar Ali
authored at least 21 papers
between 2009 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Neural Comput. Appl., April, 2023
2021
Optimal Clustering in Wireless Sensor Networks for the Internet of Things Based on Memetic Algorithm: memeWSN.
Wirel. Commun. Mob. Comput., 2021
Comparative Analysis of Deep Learning Algorithms for Classification of COVID-19 X-Ray Images.
CoRR, 2021
Complex., 2021
Investigation of General Power Sum-Connectivity Index for Some Classes of Extremal Graphs.
Complex., 2021
2020
Guaranteed lifetime protocol for IoT based wireless sensor networks with multiple constraints.
Ad Hoc Networks, 2020
IEEE Access, 2020
Improving M-Learners' Performance Through Deep Learning Techniques by Leveraging Features Weights.
IEEE Access, 2020
Proceedings of the Intelligent Systems and Applications, 2020
2019
Comparing Multiple Precipitation Products against In-Situ Observations over Different Climate Regions of Pakistan.
Remote. Sens., 2019
Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods.
Int. J. Inf. Manag., 2019
2018
Entropy Generation on Nanofluid Thin Film Flow of Eyring-Powell Fluid with Thermal Radiation and MHD Effect on an Unsteady Porous Stretching Sheet.
Entropy, 2018
2016
Adaptive TDMA scheduling for real-time flows in cluster-based wireless sensor networks.
Comput. Sci. Inf. Syst., 2016
2013
J. Appl. Math., 2013
Towards Cluster-Based Real-Time Flow Scheduling in Interference-Aware Wireless Sensor Networks.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
2012
An upper bound for the radio number of generalized gear graph.
Ars Comb., 2012
On the metric dimension of Mobius ladders.
Ars Comb., 2012
2011
xDAuth: a scalable and lightweight framework for cross domain access control and delegation.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
2009