Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RJ-11 Interfaced Embedded Platform for DTMF Based Remote Control System., , , , , and . ESA, page 239-. CSREA Press, (2007)Smart Human Security Framework Using Internet of Things, Cloud and Fog Computing., , , and . ISI (2), volume 321 of Advances in Intelligent Systems and Computing, page 251-263. Springer, (2014)Parameteric coding of speech signals., , , , , and . ICUMT, page 1-5. IEEE, (2009)Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol., , , , , , , , , and 1 other author(s). ACIS-ICIS, page 575-580. IEEE Computer Society, (2008)A deep neural network based context-aware smart epidemic surveillance in smart cities., , and . Libr. Hi Tech, 40 (5): 1159-1178 (2022)Design and Implementation of a 64-bit RISC Processor Using VHDL., , , , and . UKSim, page 568-573. IEEE Computer Society, (2009)An Embedded Platform for Intelligent Traffic Control., , , , and . EMS, page 541-545. IEEE Computer Society, (2010)Stochastic Modeling of Worm Propagation in Trusted Networks.. Security and Management, page 482-488. CSREA Press, (2006)On Path-length and Routing-tag Algorithm for Hybrid Irregular Multi-stage Interconnection Networks., , , , and . SNPD (1), page 652-657. IEEE Computer Society, (2007)Asymptotic Analysis of Dynamic Algorithms Designed to Provide Parallel Communication among NoC in NiP using MIN., , , , , and . UKSim, page 443-448. IEEE Computer Society, (2009)