Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal sensor spacing in IoT network based on quantum computing technology., and . Int. J. Parallel Emergent Distributed Syst., 38 (1): 58-84 (2023)Communicative Approximations as Rough Sets., , , and . RSCTC, volume 6086 of Lecture Notes in Computer Science, page 317-326. Springer, (2010)HybridSN: Exploring 3D-2D CNN Feature Hierarchy for Hyperspectral Image Classification., , , and . CoRR, (2019)A Novel method for IDC Prediction in Breast Cancer Histopathology images using Deep Residual Neural Networks., and . CoRR, (2019)HybridSN: Exploring 3-D-2-D CNN Feature Hierarchy for Hyperspectral Image Classification., , , and . IEEE Geosci. Remote. Sens. Lett., 17 (2): 277-281 (2020)Simulation and cost analysis of group authentication protocols., , and . IC3, page 1-7. IEEE Computer Society, (2016)Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs., , and . Int. J. Netw. Secur., 18 (1): 1-18 (2016)Cost and performance analysis of server-centric authentication protocol in supply chain management., , and . ISSPIT, page 269-274. IEEE Computer Society, (2014)Effect of Choice of Discretization Methods on Context Extraction from Sensor Data - An Empirical Evaluation., , and . ICDCIT, volume 8337 of Lecture Notes in Computer Science, page 146-151. Springer, (2014)Effective optimization and fault tolerance using multi-homed link assignment in cellular access network., and . IC3, page 244-249. IEEE, (2013)