Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threshold Cryptography-Based Secure Vehicle-to-Everything (V2X) Communication in 5G-Enabled Intelligent Transportation Systems., , , , and . Future Internet, 15 (5): 157 (May 2023)HVDC Transmission Line Fault Identification: A Learning Based UAV Control Strategy., , , , , , and . IEEE Access, (2022)Channel blocking analysis and availability prediction in cognitive radio networks., , and . ICNC, page 963-968. IEEE Computer Society, (2017)UAV Reconnaissance using Bio-Inspired Algorithms: Joint PSO and Penguin Search Optimization Algorithm (PeSOA) Attributes., , , and . CCNC, page 1-6. IEEE, (2019)Investigating Reliability for URLLC in EUHT-5G a new IMT-2020 Candidate Technology., , , , and . GLOBECOM (Workshops), page 662-667. IEEE, (2022)Impact of Denoising on Watermarking: A Perspective for Information Retrieval., , , and . TSP, page 685-689. IEEE, (2019)A no reference method for detection of dropped video frames in live video streaming., , and . ICUFN, page 839-844. IEEE, (2016)Channel resource allocation and availability prediction in hybrid access femtocells., , and . Phys. Commun., (2017)Detection of small colon bleeding in wireless capsule endoscopy videos., , , and . Comput. Medical Imaging Graph., (2016)On the suitability of VMAF for quality assessment of medical videos: Medical ultrasound & wireless capsule endoscopy., and . Comput. Biol. Medicine, (2019)