Author of the publication

Machine Learning-based Mist Computing Enabled Internet of Battlefield Things.

, , , , , , and . ACM Trans. Internet Techn., 21 (4): 101:1-101:26 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ELS-Net: A New Approach to Forecast Decomposed Intrinsic Mode Functions of Electricity Load., , , , , and . IEEE Access, (2020)Collaborative neighbor discovery in directional wireless sensor networks: algorithm and analysis., , , , , , , and . EURASIP J. Wirel. Commun. Netw., (2017)Energy-Aware Resource and Revenue Management in Federated Cloud: A Game-Theoretic Approach., , , , and . IEEE Syst. J., 11 (2): 951-961 (2017)Energy Harvested and Cooperative Enabled Efficient Routing Protocol (EHCRP) for IoT-WBAN., , , , , , , and . Sensors, 20 (21): 6267 (2020)Resilient Production Control Using Digital Twins in the Industrial Internet of Things., , , and . IEEE Trans. Consumer Electron., 70 (1): 3204-3211 (February 2024)Enhancing Brain Tumor Classification by a Comprehensive Study on Transfer Learning Techniques and Model Efficiency Using MRI Datasets., , , , , , and . IEEE Access, (2024)Doodle-Based Authentication Technique Using Augmented Reality, , , , and . IEEE Access, (2020)Machine Learning-Based Detection of Spam Emails., , , , , and . Sci. Program., (2021)Inferring Ties in Social IoT Using Location-Based Networks and Identification of Hidden Suspicious Ties., , , , , and . Sci. Program., (2020)Autonomic computation offloading in mobile edge for IoT applications., , , , and . Future Gener. Comput. Syst., (2019)