Author of the publication

Efficient UAVs Deployment and Resource Allocation in UAV-Relay Assisted Public Safety Networks for Video Transmission.

, , , , , and . IEEE Access, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Parameter Exploration for Online Change-Point Detection in Activity Monitoring Using Genetic Algorithms., , , and . Sensors, 16 (11): 1784 (2016)An ECC-based mutual data access control protocol for next-generation public cloud., , , , , , and . J. Cloud Comput., 12 (1): 101 (December 2023)Mediation approach of knowledge management process towards supply chain performance under green technology: an empirical analysis., , , , and . Bus. Process. Manag. J., 29 (5): 1466-1490 (2023)Integration of hybrid score functions to design new adaptive EWMA control chart to monitor the process mean shift., , , , and . Comput. Ind. Eng., (September 2023)Fast lock scheme for phase-locked loops., , , , , , and . CICC, page 319-322. IEEE, (2009)Change detection in human physical activities.. Ulster University, Coleraine, UK, (2018)British Library, EThOS.Change Point Detection Using Multivariate Exponentially Weighted Moving Average (MEWMA) for Optimal Parameter in Online Activity Monitoring., , , and . UCAmI (1), volume 10069 of Lecture Notes in Computer Science, page 156-165. (2016)Unraveling pine wilt disease: Comparative study of stochastic and deterministic model using spectral method., , , , , , and . Expert Syst. Appl., (2024)An Ontology-Based Multi-Agent System for Active Software Engineering Ontology., , , and . Mob. Networks Appl., 21 (1): 65-88 (2016)Protection of records and data authentication based on secret shares and watermarking., , , , and . Future Gener. Comput. Syst., (2019)