Author of the publication

Wireless powered communication network optimization using PSO-CS algorithm.

, , and . Wirel. Networks, 27 (6): 4151-4167 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recognition and identification of target images using feature based retrieval in UAV missions., and . NCVPRIPG, page 1-4. IEEE, (2013)Phishing Detection from URLs Using Deep Learning Approach., , and . ICCCS, page 1-4. IEEE, (2020)Complex Skill Learning using Modified Transformers with Automatic Chunking and Forgetting., , and . ICRAI, page 17-22. ACM, (2023)Wireless powered communication network optimization using PSO-CS algorithm., , and . Wirel. Networks, 27 (6): 4151-4167 (2021)Developing a measure of risk adjusted revenue (RAR) in credit cards market: Implications for customer relationship management., , and . Eur. J. Oper. Res., 224 (2): 425-434 (2013)Single-Sourcing vs. Multisourcing: An Empirical Analysis of Large Information Technology Outsourcing Arrangements., , , and . Inf. Syst. Res., 34 (3): 1109-1130 (2023)A Comparative Study of Internet Protocols in MANET., and . ICACDS, volume 721 of Communications in Computer and Information Science, page 221-231. Springer, (2016)Detection of emergent behaviors in system of dynamical systems using similitude theory.. WSC, page 4650-4651. IEEE, (2017)Low Cost Object Identification in RFID via Dynamic Markov Chain & Two Time Scale SPSA.. SAINT Workshops, page 64-67. IEEE Computer Society, (2006)Quick Response Encoding of Human Facial Images for Identity Fraud Detection., , , , and . IFIP Int. Conf. Digital Forensics, volume 569 of IFIP Advances in Information and Communication Technology, page 185-199. Springer, (2019)