H L.Gururaj
IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
[
Vol.4,
Issue
2
- SpringYear
2018]
H L.Gururaj
Routing Hole Handling Techniques for Wireless Sensor Networks: A Review
[
Vol.6,
Issue
2
- SpringYear
2020]
Habibi Najafi.M.
EIDA: An Energy-Intrusion aware Data Aggregation Technique for Wireless Sensor Networks
[
Vol.2,
Issue
1
- WinterYear
2016]
Habibi.Rahimeh
Utilizes the Community Detection for Increase Trust using Multiplex Networks
[
Vol.4,
Issue
1
- WinterYear
2018]
habqa.fatima
The Kinematic Analysis Of Four Degrees Of Freedom For A Medical Robot And Control It By Labview And Arduino Mega2560 (Simulation And Implementation)
[
Vol.6,
Issue
1
- WinterYear
2020]
Haggi.Sevda
An Optimization K-Modes Clustering Algorithm with Elephant Herding Optimization Algorithm for Crime Clustering
[
Vol.6,
Issue
2
- SpringYear
2020]
Haj Seyed Javadi.Haj Hamid
Detecting Active Bot Networks Based on DNS Traffic Analysis
[
Vol.5,
Issue
3
- SummerYear
2019]
Haj Seyyed Javadi.Hamid
Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design
[
Vol.1,
Issue
3
- SummerYear
2015]
Haj Seyyed Javadi.Hamid
An efficient solution for management of pre-distribution in wireless sensor networks
[
Vol.2,
Issue
2
- SpringYear
2016]
Haj Seyyed Javadi.Hamid
Topology Control in Wireless Sensor Network using Fuzzy Logic
[
Vol.1,
Issue
2
- SpringYear
2015]
Haque.Dr. A. K. M. Fazlul
A Detailed Exploration of Usability Statistics and Application Rating Based on Wireless Protocols
[
Vol.6,
Issue
1
- WinterYear
2020]
Harounabadi.Ali
Utilizes the Community Detection for Increase Trust using Multiplex Networks
[
Vol.4,
Issue
1
- WinterYear
2018]
Hasan.Md. Samaun
A Fuzzy TOPSIS Approach for Big Data Analytics Platform Selection
[
Vol.5,
Issue
1
- WinterYear
2019]
Hasanzadeh.Mohammad Reza
An Overview of the Concepts, Classifications, and Methods of Population Initialization in Metaheuristic Algorithms
[
Vol.7,
Issue
1
- WinterYear
2021]
Hedayati.Alireza
Statistical Analysis on IoT Research Trends: A Survey
[
Vol.4,
Issue
2
- SpringYear
2018]
hejazi jouybari.seyed navid
Detecting and counting vehicles using adaptive background subtraction and morphological operators in real time systems
[
Vol.5,
Issue
4
- AutumnYear
2019]
Hosseinalipour.Ali
An Optimization-based Learning Black Widow Optimization Algorithm for Text Psychology
[
Vol.7,
Issue
1
- WinterYear
2021]
Hosseini Shirvani.Mirsaeid
Energy-aware and Reliable Service Placement of IoT applications on Fog Computing Platforms by Utilizing Whale Optimization Algorithm
[
Vol.7,
Issue
1
- WinterYear
2021]
Hosseini.Rahil
A Fuzzy-GA Approach for Parameter Optimization of A Fuzzy Expert System for Diagnosis of Acute Lymphocytic Leukemia in Children
[
Vol.2,
Issue
2
- SpringYear
2016]
Hosseinpanahi.sahar
Improve Spam Detection in the Internet Using Feature Selection based on the Metahuristic Algorithms
[
Vol.7,
Issue
2
- SpringYear
2021]
hosseinzadeh moghadam.mohammadreza
A New Method for Intrusion Detection Using Genetic Algorithm and Neural network
[
Vol.3,
Issue
4
- AutumnYear
2017]
Hosseinzadeh.Farzad
A Novel ICA-based Estimator for Software Cost Estimation
[
Vol.1,
Issue
4
- AutumnYear
2015]
Hosseinzadeh.Mehdi
Overflow Detection in Residue Number System, Moduli Set {2n-1,2n,2n+1}
[
Vol.2,
Issue
1
- WinterYear
2016]
Hosseinzadeh.mhdi
Analysis of Users’ Opinions about Reasons for Divorce
[
Vol.2,
Issue
4
- AutumnYear
2016]
Hosseinzadeh.mhdi
A fault tolerance routing protocol considering defined reliability and energy consumption in wireless sensor networks
[
Vol.1,
Issue
1
- WinterYear
2015]