Author of the publication

What We Breathe As We Commute: From the Perspective of a Developing Country.

, , , , and . ACM DEV, page 19:1-19:4. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Intelligent IoT Approach for Analyzing and Managing Crowds., , , , , , , and . IEEE Access, (2021)Leveraging a Smartwatch for Activity Recognition in Salat., , , , and . IEEE Access, (2023)Fault Tolerance Analysis of Car-Following Models for Autonomous Vehicles., , and . IEEE Trans. Intell. Transp. Syst., 23 (11): 20036-20045 (2022)Towards Greening MapReduce Clusters Considering Both Computation Energy and Cooling Energy., , , , and . IEEE Trans. Parallel Distributed Syst., 32 (4): 931-942 (2021)A generalized mechanism beyond NLP for real-time detection of cyber abuse through facial expression analytics., , , and . MobiQuitous, page 348-357. ACM, (2019)Trusted Worrier: A low-cost and high-accuracy user authentication system for firearm exploiting dynamic hand pressure biometrics., , , , , , , and . NSysS, page 87-95. IEEE, (2017)Backpacking: Deployment of Heterogeneous Radios in High Data Rate Sensor Networks., , , and . ICCCN, page 1-8. IEEE, (2011)A Tale of a Deep Learning Approach to Image Forgery Detection., and . NSysS, page 102-110. IEEE, (2018)iTCP: an intelligent TCP with neural network based end-to-end congestion control for ad-hoc multi-hop wireless mesh networks., and . Wireless Networks, 21 (2): 581-610 (2015)Securing app distribution process of iOS exploiting the notion of authentic update., , and . NSysS, page 1-8. IEEE, (2016)