Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Resource Allocation Strategy with Queuing in Wireless Mobile Communication Networks., and . Comput. Inf. Sci., 2 (3): 3-14 (2009)An Edge Based Attack Detection Model (EBAD) for Increasing the Trustworthiness in IoT Enabled Smart City Environment., , , , , and . IEEE Access, (2022)Deep learning model for deep fake face recognition and detection., , , , , , and . PeerJ Comput. Sci., (2022)Wall segmentation in 2D images using convolutional neural networks., , , , , , and . PeerJ Comput. Sci., (2023)An IoT based rail track condition monitoring and derailment prevention system., , , and . Int. J. RF Technol. Res. Appl., 11 (2): 81-107 (2020)Text Document Clustering Approach by Improved Sine Cosine Algorithm., , , , , , , , and . Inf. Technol. Control., 52 (2): 541-561 (July 2023)FCO - Fuzzy constraints applied Cluster Optimization technique for Wireless AdHoc Networks., , , , and . Comput. Commun., (2020)Analyzing the Effect of Uncertainty in Low Power SRAM Cells Using Artificial Intelligence Technique., , , , , and . J. Uncertain Syst., 16 (1): 2242001:1-2242001:12 (March 2023)A new method for human activity identification using convolutional neural networks., , , and . Int. J. Cloud Comput., 12 (2/3/4): 191-200 (2023)Evaluation of deepfake detection using YOLO with local binary pattern histogram., , , and . PeerJ Comput. Sci., (2022)