Author of the publication

Use of Neural Network Based Prediction Algorithms for Powering Up Smart Portable Accessories.

, , and . Neural Process. Lett., 53 (1): 721-756 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks., , , , , and . IEEE Access, (2021)Communication and Control in Collaborative UAVs: Recent Advances and Future Trends., , , , , , and . CoRR, (2023)UAVs path planning architecture for effective medical emergency response in future networks., , , , , , and . Phys. Commun., (2021)Autonomous UAV Path-Planning Optimization Using Metaheuristic Approach for Predisaster Assessment., , , , and . IEEE Internet Things J., 9 (14): 12505-12514 (2022)Towards 6G Internet of Things: Recent Advances, Use Cases, and Open Challenges., , , and . CoRR, (2021)Resource optimization in UAV-assisted wireless networks - A comprehensive survey., , , and . Trans. Emerg. Telecommun. Technol., (2022)Use of Neural Network Based Prediction Algorithms for Powering Up Smart Portable Accessories., , and . Neural Process. Lett., 53 (1): 721-756 (2021)A Hybrid Deep Learning Approach for Bottleneck Detection in IoT., , , , , and . IEEE Access, (2022)Deep Learning-Based Intelligent Post-Bushfire Detection Using UAVs., , , and . IEEE Geosci. Remote. Sens. Lett., (2024)A strong construction of S-box using Mandelbrot set an image encryption scheme., , , , , , and . PeerJ Comput. Sci., (2022)