Author of the publication

Enhanced security using multiple paths routine scheme in cloud-MANETs.

, , , , , , and . J. Cloud Comput., 12 (1): 68 (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Human-Centered Face Computing in Multimedia Interaction and Communication., , , , and . Intelligent Multimedia Communication, volume 280 of Studies in Computational Intelligence, Springer, (2010)Global Solar Radiation Estimation and Climatic Variability Analysis Using Extreme Learning Machine Based Predictive Model., , , , , , and . IEEE Access, (2020)Multi-object trajectory tracking., , , and . Mach. Vis. Appl., 18 (3-4): 221-232 (2007)Object Tracking with Bayesian Estimation of Dynamic Layer Representations., , and . IEEE Trans. Pattern Anal. Mach. Intell., 24 (1): 75-89 (2002)Fast linear discriminant analysis using binary bases., and . Pattern Recognit. Lett., 28 (16): 2209-2218 (2007)Efficient Discriminative Nonorthogonal Binary Subspace with its Application to Visual Tracking., , , and . CoRR, (2015)Voice spoofing countermeasure for voice replay attacks using deep learning., , , , , and . J. Cloud Comput., (2022)Training and Testing Data Division Influence on Hybrid Machine Learning Model Process: Application of River Flow Forecasting., , , , , , and . Complex., (2020)A Critical Review on Selected Fuzzy Min-Max Neural Networks and Their Significance and Challenges in Pattern Classification., , , and . IEEE Access, (2019)Secured Data Collection With Hardware-Based Ciphers for IoT-Based Healthcare., , , , , and . IEEE Internet Things J., 6 (1): 410-420 (2019)