Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi objective trust aware task scheduling algorithm in cloud computing using whale optimization., , and . J. King Saud Univ. Comput. Inf. Sci., 35 (2): 791-809 (February 2023)An integrated SDN framework for early detection of DDoS attacks in cloud computing., and . J. Cloud Comput., 13 (1): 64 (December 2024)DRLBTSA: Deep reinforcement learning based task-scheduling algorithm in cloud computing., , , , , and . Multim. Tools Appl., 83 (3): 8359-8387 (January 2024)Prioritized Task-Scheduling Algorithm in Cloud Computing Using Cat Swarm Optimization., , , , , , , and . Sensors, 23 (13): 6155 (July 2023)An Efficient Trust-Aware Task Scheduling Algorithm in Cloud Computing Using Firefly Optimization., , and . Sensors, 23 (3): 1384 (February 2023)An energy efficient RL based workflow scheduling in cloud computing., and . Expert Syst. Appl., (December 2023)A Multi-Objective Based Scheduling Framework for Effective Resource Utilization in Cloud Computing., and . IEEE Access, (2023)Multi-Objective Prioritized Task Scheduler Using Improved Asynchronous Advantage Actor Critic (a3c) Algorithm in Multi Cloud Environment., , , , , , and . IEEE Access, (2024)Multi Objective Prioritized Workflow Scheduling Using Deep Reinforcement Based Learning in Cloud Computing., , , , , , , and . IEEE Access, (2024)Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network., and . ADCONS, volume 7135 of Lecture Notes in Computer Science, page 631-637. Springer, (2011)