From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deep learning for Antisocial Behaviour Analysis on Social Media., , , , и . IV, стр. 428-434. IEEE, (2020)Higher Order Colour Shift Keying Modulation Formats for Visible Light Communications., , и . VTC Spring, стр. 1-5. IEEE, (2015)Performance evaluation of MLP and RBF feed forward neural network for the recognition of off-line handwritten characters., , , , , и . ICDIP, том 7546 из SPIE Proceedings, стр. 754633. SPIE, (2010)Concurrent, Multi-Band, Single-Chain Radio Receiver for High Data-Rate HetNets., , , , и . VTC Fall, стр. 1-5. IEEE, (2017)Healthcare workers & SARS-CoV-2 infection in India: A case-control investigation in the time of COVID-19, , , , , , , , , и 1 other автор(ы). Indian Journal Medical Research, (мая 2020)Automatically Identifying Bounds on Semantic Annotations for Bioinformatics Web Service Input Parameters., , , и . ICWE Workshops, том 6385 из Lecture Notes in Computer Science, стр. 232-243. Springer, (2010)Performance evaluation of IEEE 802.15.7 CSK physical layer., , и . GLOBECOM Workshops, стр. 1064-1069. IEEE, (2013)A double-data rate (DDR) processing-in-memory (PIM) device with wideword floating-point capability., , , , , , и . ISCAS, IEEE, (2006)Healthcare workers & SARS-CoV-2 infection in India: A case-control investigation in the time of COVID-19, , , , , , , , , и 1 other автор(ы). Indian Journal of Medical Research, 0 (0): 0 (2020)Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET., , и . Clust. Comput., 21 (1): 51-63 (2018)