Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Voice Signaling Protocol for Tactical Broadcast Voice Communication in Mobile Ad Hoc Network., , , and . ICCCNT, page 1-4. IEEE, (2019)A note on the estimators for coefficient of dispersion using auxiliary information., , and . Commun. Stat. Simul. Comput., 49 (9): 2347-2356 (2020)Graphs with equal domination and independent domination numbers., , and . AKCE Int. J. Graphs Comb., 17 (2): 691-696 (2020)An intelligent and multi-terrain navigational environment monitoring robotic platform with wireless sensor network and internet of robotic things., , , and . Int. J. Mechatronics Autom., 7 (1): 32-42 (2020)Energy System 4.0: Digitalization of the Energy Sector with Inclination towards Sustainability., , , , , and . Sensors, 22 (17): 6619 (2022)Impact of Intrinsic Motivators on Knowledge Sharing in Virtual Environments: Implications for Workplace Information Literacy and Collaborative Practices.. ECIL, volume 989 of Communications in Computer and Information Science, page 211-220. Springer, (2018)Beyond Cultural Literacy: Building Introspective Information Professionals.. ECIL, volume 1533 of Communications in Computer and Information Science, page 730-740. Springer, (2021)Understanding IoT Security: A Point-by-point Investigation of IoT Weaknesses and a First Exact Glance at Web Scale IoT Exploits., , , , , and . IC3I, page 1677-1683. IEEE, (2022)A Comprehensive Description of Artificial Intelligence Techniques in Financial Market., , , , , and . IC3I, page 73-77. IEEE, (2022)A Critical Analysis on the Security Attacks and Relevant Countermeasures using ML., , , , , and . IC3I, page 96-101. IEEE, (2022)