From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Smart Human Security Framework Using Internet of Things, Cloud and Fog Computing., , , и . ISI (2), том 321 из Advances in Intelligent Systems and Computing, стр. 251-263. Springer, (2014)Parameteric coding of speech signals., , , , , и . ICUMT, стр. 1-5. IEEE, (2009)RJ-11 Interfaced Embedded Platform for DTMF Based Remote Control System., , , , , и . ESA, стр. 239-. CSREA Press, (2007)Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol., , , , , , , , , и 1 other автор(ы). ACIS-ICIS, стр. 575-580. IEEE Computer Society, (2008)A deep neural network based context-aware smart epidemic surveillance in smart cities., , и . Libr. Hi Tech, 40 (5): 1159-1178 (2022)Design and Implementation of a 64-bit RISC Processor Using VHDL., , , , и . UKSim, стр. 568-573. IEEE Computer Society, (2009)An Embedded Platform for Intelligent Traffic Control., , , , и . EMS, стр. 541-545. IEEE Computer Society, (2010)Stochastic Modeling of Worm Propagation in Trusted Networks.. Security and Management, стр. 482-488. CSREA Press, (2006)On Path-length and Routing-tag Algorithm for Hybrid Irregular Multi-stage Interconnection Networks., , , , и . SNPD (1), стр. 652-657. IEEE Computer Society, (2007)Asymptotic Analysis of Dynamic Algorithms Designed to Provide Parallel Communication among NoC in NiP using MIN., , , , , и . UKSim, стр. 443-448. IEEE Computer Society, (2009)