Author of the publication

A real-time man-in-loop threat evaluation and resource assignment in defense.

, , and . J. Oper. Res. Soc., 68 (6): 725-738 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An 8-bit systolic AES architecture for moderate data rate applications., , and . Microprocess. Microsystems, 33 (3): 221-231 (2009)Multiprocessor architecture for real-time applications using mean shift clustering., , , , and . J. Real Time Image Process., 16 (6): 2233-2246 (2019)Optimal Mapping of DSP Algorithms on Commercially Available Off-The-Shelf (COTS) VLIW DSPs., and . IEEE Trans. Consumer Electronics, 53 (3): 1061-1067 (2007)A Fuzzy Logic-Based Framework for Mapping Crime Data on Established Sociological Hypothesis for Societal Disorder Identification and Prevention., , and . IEEE Access, (2021)Spatio-Temporal Investigations of Dengue Fever in Pakistan Through an HL7 Based Public Health Framework for Hotspot Analysis., , and . IEEE Access, (2020)Adaptive Multi-Input Medium Access Control (AMI-MAC) Design Using Physical Layer Cognition for Tactical SDR Networks., , , and . IEEE Access, (2021)A Novel Data-Driven Adaptive Technique to Generate a Physician Visiting Schedule for Better Patient Experience., , and . IEEE Access, (2022)Carrier Class High Density VoIP Media Gateway using Hardware Software Distributed Architecture., , and . IEEE Trans. Consumer Electronics, 53 (4): 1513-1520 (2007)A Novel Fuzzy Inference-Based Technique for Dynamic Link Adaptation in SDR Wideband Waveform., and . IEEE Trans. Commun., 64 (6): 2602-2609 (2016)Social networks identification and analysis using call detail records., and . ICIS, volume 403 of ACM International Conference Proceeding Series, page 192-196. ACM, (2009)