default search action
Mohammad Riyaz Belgaum
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j4]Mohammad Riyaz Belgaum, Shahrulniza Musa, Fuead Ali, Muhammad Mansoor Alam, Zainab Alansari, Safeeullah Soomro, Mazliham Mohd Su'ud:
Self-Socio Adaptive Reliable Particle Swarm Optimization Load Balancing in Software-Defined Networking. IEEE Access 11: 101666-101677 (2023) - [j3]Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin, Mohammad Riyaz Belgaum:
RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things. PeerJ Comput. Sci. 9: e1309 (2023) - 2022
- [j2]Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin, Mohammad Riyaz Belgaum:
A systematic review of routing attacks detection in wireless sensor networks. PeerJ Comput. Sci. 8: e1135 (2022) - 2020
- [j1]Mohammad Riyaz Belgaum, Shahrulniza Musa, Muhammad Mansoor Alam, Mazliham Mohd Su'ud:
A Systematic Review of Load Balancing Techniques in Software-Defined Networking. IEEE Access 8: 98612-98636 (2020)
Conference and Workshop Papers
- 2023
- [c1]Mohammad Riyaz Belgaum, Shaik Maryam Momina, L. Nousheen Farhath, K. Nikhitha, K. Naga Jyothi:
Development of IoT-Healthcare Model for Gastric Cancer from Pathological Images. MIKE 2023: 193-201
Informal and Other Publications
- 2019
- [i17]Mohammad Riyaz Belgaum, Shahrulniza Musa, Mazliham Mohd Su'ud, Muhammad Alam, Safeeullah Soomro, Zainab Alansari:
Secured Approach Towards Reactive Routing Protocols Using Triple Factor in Mobile Adhoc Networks. CoRR abs/1904.01826 (2019) - [i16]Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin, Safeeullah Soomro, Mohammad Riyaz Belgaum:
Evaluation of IoT-Based Computational Intelligence Tools for DNA Sequence Analysis in Bioinformatics. CoRR abs/1904.09268 (2019) - [i15]Zainab Alansari, Safeeullah Soomro, Mohammad Riyaz Belgaum, Shahaboddin Shamshirband:
The Rise of Internet of Things (IoT) in Big Healthcare Data: Review and Open research Issues. CoRR abs/1904.09270 (2019) - [i14]Safeeullah Soomro, Mohammad Riyaz Belgaum, Zainab Alansari, Mahdi H. Miraz:
A Framework for Debugging Java Programs in a Bytecode. CoRR abs/1904.12501 (2019) - [i13]Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Muhammad Alam:
Cloud Service ranking using Checkpoint based Load balancing in real time scheduling of Cloud Computing. CoRR abs/1905.03093 (2019) - [i12]Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Shahrulniza Musa, Muhammad Alam, Mazliham Mohd Su'ud:
Load Balancing with preemptive and non-preemptive task scheduling in Cloud Computing. CoRR abs/1905.03094 (2019) - 2018
- [i11]Zeyad M. Alfawaer, Mohammad Riyaz Belgaum:
An enhanced Multipath Strategy in Mobile Ad hoc Routing Protocols. CoRR abs/1801.02853 (2018) - [i10]P. Veeresh, R. Praveen Sam, Mohammad Riyaz Belgaum:
Optimal QoS Constraint Service Composition in Mobile Ad Hoc Networks. CoRR abs/1802.08818 (2018) - [i9]Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Muhammad Alam, Shahrulniza Musa, Mazliham Mohd Su'ud:
Challenges: Bridge between Cloud and IoT. CoRR abs/1803.02890 (2018) - [i8]Safeeullah Soomro, Mohammad Riyaz Belgaum, Zainab Alansari, Mahdi H. Miraz:
Fault Localization Models in Debugging. CoRR abs/1803.03673 (2018) - [i7]Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin, Safeeullah Soomro, Mohammad Riyaz Belgaum, Mahdi H. Miraz, Jawdat Alshaer:
Challenges of Internet of Things and Big Data Integration. CoRR abs/1806.08953 (2018) - [i6]Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin, Mohammad Riyaz Belgaum, Jawdat Alshaer, Safeeullah Soomro, Mahdi H. Miraz:
Internet of Things: Infrastructure, Architecture, Security and Privacy. CoRR abs/1807.04087 (2018) - 2017
- [i5]Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Muhammad Alam:
Treatment of Reactive Routing Protocols Using Second Chance Based On Malicious Behavior of Nodes in MANETS. CoRR abs/1708.01639 (2017) - [i4]Safeeullah Soomro, Zainab Alansari, Mohammad Riyaz Belgaum:
Control and Data Flow Execution of Java Programs. CoRR abs/1708.07393 (2017) - [i3]Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Muhammad Alam:
Ideal Node Enquiry Search Algorithm (INESH) in MANETS. CoRR abs/1710.10145 (2017) - 2016
- [i2]Abdul Ahad Abro, Safeeullah Soomro, Zainab Alansari, Mohammad Riyaz Belgaum, Abdul Baqi Khan Khakwani:
Secure Network in Business-to-Business application by using Access Control List (ACL) and Service Level Agreement (SLA). CoRR abs/1612.07685 (2016) - [i1]Nareena Soomro, Safeeullah Soomro, Zainab Alansari, Suhni Abbasi, Mohammad Riyaz Belgaum, Abdul Baqi Khan Khakwani:
Development of UMLS Based Health Care Web Services for Android Platform. CoRR abs/1612.07688 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint