Author of the publication

Artificial neural network-based secured communication strategy for vehicular ad hoc network.

, , , , , , and . Soft Comput., 27 (1): 297-309 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CNSD-Net: joint brain-heart disorders identification using remora optimization algorithm-based deep Q neural network., , , , and . Soft Comput., 27 (17): 12653-12668 (2023)Artificial neural network-based secured communication strategy for vehicular ad hoc network., , , , , , and . Soft Comput., 27 (1): 297-309 (2023)The Cydram 5 Stride-Insensitive Memory System., , and . ICPP (1), page 242-246. Pennsylvania State University Press, (1989)Some scheduling techniques and an easily schedulable horizontal architecture for high performance scientific computing., and . MICRO, page 183-198. IEEE/ACM, (1981)Optimization of Machine Descriptions for Efficient Use., , and . Int. J. Parallel Program., 26 (4): 417-447 (1998)Instruction-level parallel processing: History, overview, and perspective., and . J. Supercomput., 7 (1-2): 9-50 (1993)A Framework for Task-specific Short Document Expansion., , and . CIKM, page 791-800. ACM, (2016)The Cydra 5 Departmental Supercomputer: Design Philosophies, Decisions, and Trade-offs., , , and . Computer, 22 (1): 12-35 (1989)Embedded Computer Architecture and Automation., and . Computer, 34 (4): 75-83 (2001)Efficient design space exploration in PICO., and . CASES, page 71-79. ACM, (2000)