Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics., , , , and . IEEE Trans. Ind. Informatics, 15 (7): 4189-4196 (2019)Automatic Fruit Classification Using Deep Learning for Industrial Applications., , and . IEEE Trans. Ind. Informatics, 15 (2): 1027-1034 (2019)Authenticated media uploading framework for mobile cloud computing., and . Memetic Comput., 8 (4): 325-332 (2016)Word-of-Mouth Understanding: Entity-Centric Multimodal Aspect-Opinion Mining in Social Media., , , , and . IEEE Trans. Multim., 17 (12): 2281-2296 (2015)Audio-Visual Emotion-Aware Cloud Gaming Framework., , , , , and . IEEE Trans. Circuits Syst. Video Technol., 25 (12): 2105-2118 (2015)Proactive Cache-Based Location Privacy Preserving for Vehicle Networks., , , , and . IEEE Wirel. Commun., 25 (6): 77-83 (2018)A Deep-Tree-Model-Based Radio Resource Distribution for 5G Networks., and . IEEE Wirel. Commun., 27 (1): 62-67 (2020)Inhibition/Enhancement Network Based ASR using Multiple DPF Extractors., , , , and . J. Multim., 6 (5): 395-403 (2011)Enhanced engineering education using smart class environment., , , , , and . Comput. Hum. Behav., (2015)Robust copy-move image forgery detection using undecimated wavelets and Zernike moments., and . ICIMCS, page 95-98. ACM, (2011)