Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Embedded cylindrical magneto-hydrodynamic antenna., and . Int. J. Ultra Wideband Commun. Syst., 3 (2): 68-74 (2015)Apparatus for Ensuring Seat Belt Usage and Checking Blood Alcohol Concentration., , and . RAM, page 353-357. IEEE, (2008)Non-deterministic approach to allay replay attack on iris biometric., and . Pattern Anal. Appl., 22 (2): 717-729 (2019)Big Data: Overview., , and . CoRR, (2014)Unified and Modular Modeling and Functional Verification Framework of Real-Time Image Signal Processors., and . VLSI Design, (2016)Whale optimization algorithm fused with SVM to detect stress in EEG signals., , and . Intell. Decis. Technol., 15 (1): 87-97 (2021)Modified Support Vector Machine for Detecting Stress Level Using EEG Signals., , and . Comput. Intell. Neurosci., (2020)A Paramount Pair of Cache Replacement Algorithms on L1 and L2 Using Multiple Databases with Security., , and . ICETET, page 346-351. IEEE Computer Society, (2009)A Non-deterministic Approach to Mitigate Replay Attack and Database Attack Simultaneously on Iris Recognition System., and . IHCI, volume 11278 of Lecture Notes in Computer Science, page 239-250. Springer, (2018)Dynamic Point Selection Schemes for LTE-A Networks with Load Imbalance., , and . VTC Fall, page 1-5. IEEE, (2015)