Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Evaluation of Load Balanced Termite: A Novel Load Aware Bio Inspired Routing Protocol for Mobile Ad Hoc Network., and . Wireless Personal Communications, 75 (4): 2053-2071 (2014)Language Modelling and English Speech Prediction System to Aid People with Stuttering Disorder., , , and . WCI, page 191-195. ACM, (2015)An E-Learning System with Multifacial Emotion Recognition Using Supervised Machine Learning., , , and . T4E, page 23-26. IEEE Computer Society, (2015)Content-Based Video Copy Detection Scheme Using Motion Activity and Acoustic Features., and . SIRS, volume 264 of Advances in Intelligent Systems and Computing, page 491-504. Springer, (2014)Optimal load balancing in cloud computing by efficient utilization of virtual machines., and . COMSNETS, page 1-4. IEEE, (2014)Software aging trend analysis of server virtualized system., and . ICOIN, page 260-263. IEEE Computer Society, (2014)A GPU Framework for Sparse Matrix Vector Multiplication., , and . ISPDC, page 51-58. IEEE, (2014)An intelligent content-based image retrieval system for clinical decision support in brain tumor diagnosis., and . Int. J. Multim. Inf. Retr., 2 (3): 175-188 (2013)A Novel Approach to Video Copy Detection Using Audio Fingerprints and PCA., and . ANT/MobiWIS, volume 5 of Procedia Computer Science, page 149-156. Elsevier, (2011)Cross layer service driven adaptive retry limit for IEEE 802.11 Mobile Ad-Hoc Networks., and . Wireless Days, page 1-3. IEEE, (2011)