Mohammad Riyaz Belgaum

Follow

Generating author description...

All published works
Action Title Year Authors
+ Secured Approach Towards Reactive Routing Protocols Using Triple Factor in Mobile Adhoc Networks. 2019 Mohammad Riyaz Belgaum
Shahrulniza Musa
Mazliham Mohd Su’ud
Muhammad Mansoor Alam
Safeeullah Soomro
Zainab Alansari
+ PDF Chat Secured Approach towards Reactive Routing Protocols Using Triple Factor in Mobile Ad Hoc Networks 2019 Mohammad Riyaz Belgaum
Shahrulniza Musa
Mazliham MohdSu’ud
Muhammad Mansoor Alam
Safeeullah Soomro
Zainab Alansari
+ Secured Approach Towards Reactive Routing Protocols Using Triple Factor in Mobile Adhoc Networks 2019 Mohammad Riyaz Belgaum
Shahrulniza Musa
Mazliham Mohd Su’ud
Muhammad A. Alam
Safeeullah Soomro
Zainab Alansari
+ PDF Chat Internet of Things: Infrastructure, Architecture, Security and Privacy 2018 Zainab Alansari
Nor Badrul Anuar
Amirrudin Kamsin
Mohammad Riyaz Belgaum
Jawdat Alshaer
Safeeullah Soomro
Mahdi H. Miraz
+ PDF Chat A Framework for Debugging Java Programs in a Bytecode 2018 Safeeullah Soomro
Mohammad Riyaz Belgaum
Zainab Alansari
Mahdi H. Miraz
+ Internet of Things: Infrastructure, Architecture, Security and Privacy 2018 Zainab Alansari
Nor Badrul Anuar
Amirrudin Kamsin
Mohammad Riyaz Belgaum
Jawdat Alshaer
Safeeullah Soomro
Mahdi H. Miraz
+ PDF Chat Evaluation of IoT-Based Computational Intelligence Tools for DNA Sequence Analysis in Bioinformatics 2018 Zainab Alansari
Nor Badrul Anuar
Amirrudin Kamsin
Safeeullah Soomro
Mohammad Riyaz Belgaum
+ Challenges of Internet of Things and Big Data Integration 2018 Zainab Alansari
Nor Badrul Anuar
Amirrudin Kamsin
Safeeullah Soomro
Mohammad Riyaz Belgaum
Mahdi H. Miraz
Jawdat Alshaer
+ Challenges: Bridge between Cloud and IoT. 2018 Mohammad Riyaz Belgaum
Safeeullah Soomro
Zainab Alansari
Muhammad Mansoor Alam
Shahrulniza Musa
Mazliham Mohd Su’ud
+ PDF Chat Cloud Service Ranking Using Checkpoint-Based Load Balancing in Real-Time Scheduling of Cloud Computing 2018 Mohammad Riyaz Belgaum
Safeeullah Soomro
Zainab Alansari
Muhammad Mansoor Alam
+ Internet of Things: Infrastructure, Architecture, Security and Privacy 2018 Zainab Alansari
Nor Badrul Anuar
Amirrudin Kamsin
Mohammad Riyaz Belgaum
Jawdat Alshaer
Safeeullah Soomro
Mahdi H. Miraz
+ Challenges: Bridge between Cloud and IoT 2018 Mohammad Riyaz Belgaum
Safeeullah Soomro
Zainab Alansari
Muhammad A. Alam
Shahrulniza Musa
Mazliham Mohd Su’ud
+ Challenges of Internet of Things and Big Data Integration 2018 Zainab Alansari
Nor Badrul Anuar
Amirrudin Kamsin
Safeeullah Soomro
Mohammad Riyaz Belgaum
Mahdi H. Miraz
Jawdat Alshaer
+ PDF Chat The Rise of Internet of Things (IoT) in Big Healthcare Data: Review and Open Research Issues 2017 Zainab Alansari
Safeeullah Soomro
Mohammad Riyaz Belgaum
Shahab S. Band
+ PDF Chat Fault localization models in debugging 2017 Safeeullah Soomro
Mohammad Riyaz Belgaum
Zainab Alansari
Mahdi H. Miraz
+ PDF Chat Challenges: Bridge between cloud and IoT 2017 Mohammad Riyaz Belgaum
Safeeullah Soomro
Zainab Alansari
Shahrulniza Musa
Muhammad Mansoor Alam
Mazliham Mohd Su’ud
+ PDF Chat Optimal QoS constraint service composition in mobile ad hoc networks 2017 P. Veeresh
R. Praveen Sam
Mohammad Riyaz Belgaum
+ PDF Chat Ideal Node Enquiry Search Algorithm (INESH) in MANETS 2017 Mohammad Riyaz Belgaum
Safeeullah Soomro
Zainab Alansari
Muhammad Mansoor Alam
+ PDF Chat Load balancing with preemptive and non-preemptive task scheduling in cloud computing 2017 Mohammad Riyaz Belgaum
Safeeullah Soomro
Zainab Alansari
Muhammad Mansoor Alam
Shahrulniza Musa
Mazliham Mohd Su’ud
+ Treatment of Reactive Routing Protocols Using Second Chance Based On Malicious Behavior of Nodes in MANETS 2017 Mohammad Riyaz Belgaum
Safeeullah Soomro
Zainab Alansari
Muhammad Mansoor Alam
+ Control and Data Flow Execution of Java Programs 2017 Safeeullah Soomro
Zainab Alansari
Mohammad Riyaz Belgaum
+ Ideal Node Enquiry Search Algorithm (INESH) in MANETS 2017 Mohammad Riyaz Belgaum
Safeeullah Soomro
Zainab Alansari
Muhammad A. Alam
+ Treatment of Reactive Routing Protocols Using Second Chance Based On Malicious Behavior of Nodes in MANETS 2017 Mohammad Riyaz Belgaum
Safeeullah Soomro
Zainab Alansari
Muhammad A. Alam
+ Secure Network in Business-to-Business application by using Access Control List (ACL) and Service Level Agreement (SLA) 2016 Abdul Ahad Abro
Safeeullah Soomro
Zainab Alansari
Mohammad Riyaz Belgaum
Abdul Baqi Khan Khakwani
+ Development of UMLS Based Health Care Web Services for Android Platform 2016 Nareena Soomro
Safeeullah Soomro
Zainab Alansari
Suhni Abbasi
Mohammad Riyaz Belgaum
Abdul Baqi Khan Khakwani
+ Secure Network in Business-to-Business application by using Access Control List (ACL) and Service Level Agreement (SLA) 2016 Abdul Ahad Abro
Saima Siraj Soomro
Zainab Alansari
Mohammad Riyaz Belgaum
B. K. Khakwani
+ Development of UMLS Based Health Care Web Services for Android Platform 2016 Nareena Soomro
Safeeulah Soomro
Zainab Alansari
Suhni Abbasi
Mohammad Riyaz Belgaum
Abdul Baqi Khan Khakwani
Common Coauthors
Commonly Cited References
Action Title Year Authors # of times referenced
+ PDF Chat An Enhanced Multipath Strategy in Mobile Ad Hoc Routing Protocols 2017 Zeyad M. Alfawaer
Belgaum Mohammad Riyaz
5
+ PDF Chat The Rise of Internet of Things (IoT) in Big Healthcare Data: Review and Open Research Issues 2017 Zainab Alansari
Safeeullah Soomro
Mohammad Riyaz Belgaum
Shahab S. Band
5
+ PDF Chat Cloud Service Ranking Using Checkpoint-Based Load Balancing in Real-Time Scheduling of Cloud Computing 2018 Mohammad Riyaz Belgaum
Safeeullah Soomro
Zainab Alansari
Muhammad Mansoor Alam
5
+ PDF Chat Treatment of Reactive Routing Protocols Using Second Chance Based on Malicious behavior of Nodes in MANETS 2018 Muhammad Riyaz Belgaum
Safee Soomro
Zainab Alansari
Muhammad Mansoor Alam
4
+ PDF Chat Context Aware Computing for The Internet of Things: A Survey 2013 Charith Perera
Arkady Zaslavsky
Peter Christen
Dimitrios Georgakopoulos
3
+ PDF Chat A Survey of Distributed Certificate Authorities in MANETs 2018 Junaid Chaudhry
Kashif Saleem
Paul Haskell‐Dowland
Mahdi H. Miraz
2
+ PDF Chat Ideal Node Enquiry Search Algorithm (INESH) in MANETS 2017 Mohammad Riyaz Belgaum
Safeeullah Soomro
Zainab Alansari
Muhammad Mansoor Alam
2
+ PDF Chat Challenges: Bridge between cloud and IoT 2017 Mohammad Riyaz Belgaum
Safeeullah Soomro
Zainab Alansari
Shahrulniza Musa
Muhammad Mansoor Alam
Mazliham Mohd Su’ud
2
+ PDF Chat Simulation and Analysis of Quality of Service (QoS) Parameters of Voice over IP (VoIP) Traffic through Heterogeneous Networks 2017 Mustafar K.H.
Aamir Suhail
A. Muzafar
Maaruf Ali
Hany AbdElhakim AbdElrahman
1
+ Multilingual Website Usability Analysis Based on an International User Survey 2017 Mahdi H. Miraz
Maaruf Ali
P.S. Excell
1
+ PDF Chat Load balancing with preemptive and non-preemptive task scheduling in cloud computing 2017 Mohammad Riyaz Belgaum
Safeeullah Soomro
Zainab Alansari
Muhammad Mansoor Alam
Shahrulniza Musa
Mazliham Mohd Su’ud
1
+ Blockchain Enabled Enhanced IoT Ecosystem Security 2018 Mahdi H. Miraz
Maaruf Ali
1
+ PDF Chat Evaluation of IoT-Based Computational Intelligence Tools for DNA Sequence Analysis in Bioinformatics 2018 Zainab Alansari
Nor Badrul Anuar
Amirrudin Kamsin
Safeeullah Soomro
Mohammad Riyaz Belgaum
1
+ Secure Network in Business-to-Business application by using Access Control List (ACL) and Service Level Agreement (SLA) 2016 Abdul Ahad Abro
Safeeullah Soomro
Zainab Alansari
Mohammad Riyaz Belgaum
Abdul Baqi Khan Khakwani
1
+ PDF Chat Geospatial big data handling theory and methods: A review and research challenges 2015 Songnian Li
Suzana Dragićević
Francesc AntĂłn Castro
Monika Sester
Stephan Winter
Arzu Çöltekin
Christopher Pettit
Bin Jiang
James Haworth
Alfred Stein
1
+ Enhanced Load Balancing Approach to Avoid Deadlocks in Cloud 2012 K. S. Rashmi
V. Suma
M. Vaidehi
1
+ PDF Chat Ariadne: analysis for machine learning programs 2018 Julian Dolby
Avraham Shinnar
Allison Allain
Jenna Reinen
1
+ Path Conditions Help to Locate and Localize Faults from Programs 2013 Safeeullah Soomro
Zahid Hussain
Ayaz Keerio
1
+ PDF Chat SLA-oriented resource provisioning for cloud computing: Challenges, architecture, and solutions 2011 Rajkumar Buyya
Saurabh Garg
Rodrigo N. Calheiros
1
+ PDF Chat A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT) 2015 Mahdi H. Miraz
Maaruf Ali
P.S. Excell
Rich Picking
1
+ PDF Chat Big Data Privacy in the Internet of Things Era 2015 Charith Perera
Rajiv Ranjan
Lizhe Wang
Samee U. Khan
Albert Y. Zomaya
1
+ PDF Chat Internet of Things: Applications and Challenges in Technology and Standardization 2011 Debasis Bandyopadhyay
Jaydip Sen
1
+ Application of Selective Algorithm for Effective Resource Provisioning in Cloud Computing Environment 2014 Mayanka Katyal
Atul Mishra
1
+ Applications of the extent analysis method on fuzzy AHP 1996 Da-Yong Chang
1
+ Effect of Mobility and Traffic Models on the Energy Consumption in MANET Routing Protocols 2013 Said El Kafhali
Abdelkrim Haqiq
1
+ Secure Network in Business-to-Business application by using Access Control List (ACL) and Service Level Agreement (SLA) 2016 Abdul Ahad Abro
Saima Siraj Soomro
Zainab Alansari
Mohammad Riyaz Belgaum
B. K. Khakwani
1