Author of the publication

An optimal deep belief with buffalo optimization algorithm for fault detection and power loss in grid-connected system.

, , , , , , , , , , and . Soft Comput., 28 (3): 2577-2591 (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model., , , and . Symmetry, 12 (5): 754 (2020)A Hybrid Cryptographic Mechanism for Secure Data Transmission in Edge AI Networks., , , and . Int. J. Comput. Intell. Syst., 17 (1): 24 (December 2024)Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique., , , , , and . Comput. Syst. Sci. Eng., 44 (1): 859-872 (2023)Deep Ensemble Fake News Detection Model Using Sequential Deep Learning Technique., , , , and . Sensors, 22 (18): 6970 (2022)Novel Component-Based Development Model for SIP-Based Mobile Application (1202)., , , and . CoRR, (2012)A Comprehensive Study of Commonly Practiced Heavy and Light Weight Software Methodologies, , and . CoRR, (2011)An Integrated Approach of Fuzzy Logic, AHP and TOPSIS for Estimating Usable-Security of Web Applications., , , , , and . IEEE Access, (2020)Key Issues in Healthcare Data Integrity: Analysis and Recommendations., , , , , , and . IEEE Access, (2020)A Comprehensive Study of Commonly Practiced Heavy & Light Weight Software Methodologies, , and . CoRR, (2012)Mobile Deep Learning: Exploring Deep Neural Network for Predicting Context-Aware Smartphone Usage., , , , and . SN Comput. Sci., 2 (3): 146 (2021)