Author of the publication

Intelligent Real-Time Utilization of Hybrid Energy Resources for Cost Optimization in Smart Microgrids.

, , , and . IEEE Syst. J., 18 (1): 186-197 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tag Digit Based Honeypot to Detect Shoulder Surfing Attack., and . SSCC, volume 467 of Communications in Computer and Information Science, page 101-110. Springer, (2014)Few notes towards making honeyword system more secure and usable., and . SIN, page 237-245. ACM, (2015)Multi-Objective Heuristic Charge Scheduling and Eco-Routing Mechanism for Electric Vehicles., , and . e-Energy, page 468-470. ACM, (2018)SGP: A Safe Graphical Password System Resisting Shoulder-Surfing Attack on Smartphones., , and . ICISS, volume 11281 of Lecture Notes in Computer Science, page 129-145. Springer, (2018)Subdomain adaptation via correlation alignment with entropy minimization for unsupervised domain adaptation., , , and . Pattern Anal. Appl., 27 (1): 13 (March 2024)COVID-19 Detection from Lung Ultrasound Images using a Fuzzy Ensemble-based Transfer Learning Technique., , , and . ICPR, page 5170-5176. IEEE, (2022)Vision Transformer Based COVID-19 Detection Using Chest CT-scan images., , , and . BHI, page 1-4. IEEE, (2022)Vision Transformer-Based Federated Learning for COVID-19 Detection Using Chest X-Ray., , , , and . ICONIP (7), volume 1794 of Communications in Computer and Information Science, page 77-88. Springer, (2022)An Automated Policy Verification and Enforcement Framework for Ethereum Applications., , and . ICBC, page 1-5. IEEE, (2023)Supporting Negative Authorization in Spatiotemporal Role Based Access Control., and . NetCoM, page 422-427. IEEE Computer Society, (2009)