Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy-efficient fog computing in Internet of Things based on Routing Protocol for Low-Power and Lossy Network with Contiki., , , , , and . Int. J. Commun. Syst., (2022)Some new periodic solitary wave solutions of (3+1)-dimensional generalized shallow water wave equation by Lie symmetry approach., and . Comput. Math. Appl., 78 (3): 857-877 (2019)Model-based and data-driven prognosis of automotive and electronic systems., , , , , , and . CASE, page 96-101. IEEE, (2009)Health Monitoring of Electronic Products Using Symbolic Time Series Analysis., and . AAAI Fall Symposium: Artificial Intelligence for Prognostics, volume FS-07-02 of AAAI Technical Report, page 73-80. AAAI Press, (2007)Dynamical behaviors and abundant optical soliton solutions of the cold bosonic atoms in a zig-zag optical lattice model using two integral schemes., and . Math. Comput. Simul., (2022)iCACD: an intelligent deep learning model to categorise current affairs news article for efficient journalistic process., , , , and . Int. J. Syst. Assur. Eng. Manag., 13 (5): 2572-2582 (2022)Insights and reflections using data analytics approach of COVID-19 situation among the Indian states and ethical considerations., , , , and . Int. J. Syst. Assur. Eng. Manag., 13 (1): 131-142 (2022)Defected Ground Split Ring Resonator-Based Sensor for Adulteration Detection in Fluids., , , and . Wirel. Pers. Commun., 121 (3): 1593-1606 (2021)CAMTA: Casual Attention Model for Multi-touch Attribution., , , , , and . CoRR, (2020)A Biometric-Based Encryption Method for Secure Data Sharing in Cloud Environment., , , and . SNSFAIT, volume 3390 of CEUR Workshop Proceedings, page 17-26. CEUR-WS.org, (2023)