Author of the publication

Analysis of Blockchain Technology to Protect Data Access Using Intelligent Contract Mechanism for 5G Networks.

, , , , , and . IC3I, page 1651-1657. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Priority based NDS data scheduling algorithm for vehicle to hotspot communication., , , and . ICVES, page 25-30. IEEE, (2009)Carbohydrate Recommendation for Type-1 Diabetics Patient Using Machine Learning., , , , , and . IC3I, page 600-604. IEEE, (2022)Calories Burned Prediction Using Machine Learning., , , , , and . IC3I, page 1712-1717. IEEE, (2023)Supervised Machine Learning Method for Ontology-based Financial Decisions in the Stock Market., , , , , and . ACM Trans. Asian Low Resour. Lang. Inf. Process., 22 (5): 139:1-139:24 (May 2023)Analysis of Blockchain Technology to Protect Data Access Using Intelligent Contract Mechanism for 5G Networks., , , , , and . IC3I, page 1651-1657. IEEE, (2023)A Comprehensive Analysis of Machine Learning Techniques in Biomedical Image Processing Using Convolutional Neural Network., , and . IC3I, page 1363-1369. IEEE, (2022)Secure Authentication Protocols For Internet Of Things (Iot) Devices., , , , , and . IC3I, page 1569-1574. IEEE, (2023)Service priority dependent vehicle to hotspot communication opportunistic scheduling., , and . ICIIS, page 65-70. IEEE, (2016)Ad-hoc on demand distance vector routing protocol using Dijkastra's algorithm (AODV-D) for high throughput in VANET (Vehicular Ad-hoc Network)., , and . ICIIS, page 355-359. IEEE, (2016)Exploratory Application of Deep Learning in Pharmaceutical Drug Discovery., , , , , and . IC3I, page 1619-1623. IEEE, (2023)