Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correction to: Diagnosis and combating COVID-19 using wearable Oura smart ring with deep learning methods., , , , , and . Pers. Ubiquitous Comput., 26 (1): 37 (2022)Scalable and Storage Efficient Dynamic Key Management Scheme for Wireless Sensor Network., , , and . Wirel. Commun. Mob. Comput., (2021)Editorial: Blockchain-based 6G and industrial internet of things systems for industry 4.0/5.0., and . Expert Syst. J. Knowl. Eng., (2022)Levelized Multiple Workflow Allocation Strategy Under Precedence Constraints With Task Merging in IaaS Cloud Environment., , , , , , and . IEEE Access, (2022)Fuzzy Controller Designed-Based Multilevel Inverter for Power Quality Enhancement., , , , , , and . IEEE Trans. Consumer Electron., 70 (2): 4839-4847 (May 2024)A novel coarse-to-fine computational method for three-dimensional landmark detection to perform hard-tissue cephalometric analysis., , , , , , , , and . Expert Syst. J. Knowl. Eng., (June 2024)Deep Convolutional Nets Learning Classification for Artistic Style Transfer., , , , , and . Sci. Program., (2022)Refinement modeling and verification of secure operating systems for communication in digital twins., , , and . Digit. Commun. Networks, 10 (2): 304-314 (2024)Architecture and routing protocols for internet of vehicles: a review., , , , , and . Int. J. Ad Hoc Ubiquitous Comput., 40 (1/2/3): 159-175 (2022)An evolutionary KNN model for DDoS assault detection using genetic algorithm based optimization., , , , , , , , and . Multim. Tools Appl., 83 (35): 83005-83028 (October 2024)