Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Set-point optimization frameworks for leveraging passive thermal storage in buildings., , and . SmartGridComm, page 26-31. IEEE, (2016)Short-Term Forecasting of Stock Prices Using Long Short Term Memory., and . ICIT, page 182-186. IEEE, (2018)Extremum Seeking Control for multi-objective optimization problems., and . CDC, page 1112-1118. IEEE, (2016)Scheduling to Minimize Age of Information with Multiple Sources., and . WiOpt, page 57-64. IEEE, (2022)Deep CNN Based Automatic Detection and Identification of Bengal Tigers., , , , and . CICBA, volume 1406 of Communications in Computer and Information Science, page 189-198. Springer, (2021)Benchmarking and Analysis of Variations of Work Stealing Scheduler on Clustered System., and . PDCAT, page 28-35. IEEE Computer Society, (2014)An effective DDoS attack mitigation strategy for IoT using an optimization-based adaptive security model., and . Knowl. Based Syst., (2024)Vayu Vishleshan: AQI Monitoring and Reduction Analysis., , , , and . BDA (Astronomy, Science, and Engineering), volume 14516 of Lecture Notes in Computer Science, page 184-197. Springer, (2023)DIRS24.v1., , and . (April 2024)Vision based human interaction system for disabled., , , and . IPTA, page 441-446. IEEE, (2010)