Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Bad/Good Are the External Forward Shock Models of Gamma-Ray Bursts?, , , , , , , , , and 1 other author(s). (Mar 12, 2015)Spoken Language Identification Using Hybrid Feature Extraction Methods, , , and . CoRR, (2010)Efficient regular expression pattern matching for network intrusion detection systems using modified word-based automata., and . SIN, page 103-110. ACM, (2012)Performance of Wireless Powered DF Relay System Under Nakagami-$m$ Fading: Relay Assists Energy-Constrained Source., and . IEEE Syst. J., 14 (2): 2497-2507 (2020)Average BER and resource allocation in wireless powered decode-and-forward relay system., and . IET Commun., 13 (4): 379-386 (2019)Enhancing ML model accuracy for Digital VLSI circuits using diffusion models: A study on synthetic data generation., , and . CoRR, (2023)Segmentation of color images using genetic algorithm with image histogram., , , and . ICMV, volume 9445 of SPIE Proceedings, page 94450M. SPIE, (2014)Efficient FPGA Implementation of Conjugate Gradient Methods for Laplacian System using HLS., , , , and . FPGA, page 308-309. ACM, (2019)Information diffusion modeling and analysis for socially interacting networks., and . Soc. Netw. Anal. Min., 11 (1): 11 (2021)An interaction-based method for detecting overlapping community structure in real-world networks., and . Int. J. Data Sci. Anal., 14 (1): 27-44 (2022)