Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet of Things Based Reduction of Electricity Theft in Urban Areas., , , , , and . IC3I, page 2642-2645. IEEE, (2023)Use of MQTT-SN in Sending Distress Signals in Vehicular Communication., and . ISNCC, page 1-6. IEEE, (2023)Addressing IoT Security Challenges: A Framework for Determining Security Requirements of Smart Locks Leveraging MQTT-SN., and . ISNCC, page 1-7. IEEE, (2023)Integrated Analysis of Research Publications and Patents for Strategic Decision Making., , , and . ICDM Workshops, page 210-217. IEEE Computer Society, (2016)Cyber Threat Analysis of Consumer Devices., and . ICACDS (2), volume 1046 of Communications in Computer and Information Science, page 32-45. Springer, (2019)Onboarding and Software Update Architecture for IoT Devices., and . PST, page 1-11. IEEE, (2019)Obtaining Technology Insights from Large and Heterogeneous Document Collections., , and . WI-IAT (2), page 102-109. IEEE Computer Society, (2014)978-1-4799-4143-8.Performance Analysis of Windowing algorithms during Filtering of an Additive White Gaussian Noisy EMG Signal., , , and . ICCCNT, page 1-7. IEEE, (2022)Performance Analysis of DCT Based Lossy Compression Method with Symmetrical Encryption Algorithms., , and . EAI Endorsed Trans. Energy Web, 7 (28): e13 (2020)Implementation of Deep Learning Based Compression Technique and Comparative Analysis With Conventional Methodologies., , , and . ICCCNT, page 1-6. IEEE, (2022)