A Performance of Computational Intelligence for Security in Wireless Networks
- Azham Hussain
- Suganthi Manoharan
|
PDF
|
Privacy-Preserving for E-Healthcare System Based on Fog Computing Using Encryption Techniques
- Gomo Sherriff
- Chen Kim Lim
- Gerard Efe Akusu
|
PDF
|
Heuristic Algorithms for Mobile Edge Computing Recovery System Based on Ad-Hoc Relay Nodes
- Azham Hussain
- Mohammad Nuruzzaman
|
PDF
|
A New and Repeatable Software Stop Testing Methodology
- Kanchana Kaewthong
- Jutaporn Lertkrai
|
PDF
|
Multiple Server Queuing System to Analyze the Finite Queue Length
- Ammar Hameed Shnain
- Sherry Kwabla
|
PDF
|