Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image compression by morphological operators., , and . IGARSS, page 3314-3316. IEEE, (2002)Uncertainty in fault tree analysis: A fuzzy approach., , and . Fuzzy Sets Syst., 83 (2): 135-141 (1996)PPO - An Approach to Personalized Web Acceleration, and . (2017)Context-based error recovery technique for GSM AMR speech codec., and . ICASSP, page 185-188. IEEE, (2002)Long Term Deflection Monitoring of Cable-Stayed Bridge Using Time-Series Interferometry., , and . IGARSS, page 2255-2257. IEEE, (2018)Land Subsidence Monitoring in the Kathmandu Basin, Before and After MW 7.8 Gorkha Earthquake, Nepal by Sbas-Dinsar Technique., , and . IGARSS, page 525-528. IEEE, (2018)RISC processor based speech codec implementation for emerging mobile multimedia messaging solutions., , and . DSP, page 831-834. IEEE, (2002)Optimal speech codec implementation on ARM9E (v5E architecture) RISC processor for next-generation mobile multimedia., , and . VCIP, volume 5308 of SPIE Proceedings, SPIE, (2004)Monitoring the Stability of Tide Gauges Using Time-Series INSAR Analysis: A Case Study in Pohang, South Korea., , , , and . IGARSS, page 2010-2013. IEEE, (2019)Lightweight integrated cryptosystem based on reconfigurable hardware for IoT security., , and . Int. J. Inf. Comput. Secur., 22 (3/4): 323-353 (2023)