Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Bad/Good Are the External Forward Shock Models of Gamma-Ray Bursts?, , , , , , , , , and 1 other author(s). (Mar 12, 2015)Spoken Language Identification Using Hybrid Feature Extraction Methods, , , and . CoRR, (2010)Performance of Wireless Powered DF Relay System Under Nakagami-$m$ Fading: Relay Assists Energy-Constrained Source., and . IEEE Syst. J., 14 (2): 2497-2507 (2020)Efficient regular expression pattern matching for network intrusion detection systems using modified word-based automata., and . SIN, page 103-110. ACM, (2012)Gender classification using pitch and formants., , , and . ICCCS, page 319-324. ACM, (2011)DeepNet: An Efficient Neural Network for Fake News Detection using News-User Engagements., , , , , and . ICCCS, page 1-6. IEEE, (2020)Nonnegative Low-Rank Tensor Completion via Dual Formulation with Applications to Image and Video Completion., , and . WACV, page 4069-4077. IEEE, (2022)marl-jax: Multi-agent Reinforcement Leaning Framework for Social Generalization., , and . ECML/PKDD (7), volume 14175 of Lecture Notes in Computer Science, page 300-304. Springer, (2023)Extracting Emotion Quotient of Viral Information Over Twitter., , and . ICDCIT, volume 13145 of Lecture Notes in Computer Science, page 210-226. Springer, (2022)Average BER and resource allocation in wireless powered decode-and-forward relay system., and . IET Commun., 13 (4): 379-386 (2019)