Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HybridSN: Exploring 3-D-2-D CNN Feature Hierarchy for Hyperspectral Image Classification., , , and . IEEE Geosci. Remote. Sens. Lett., 17 (2): 277-281 (2020)Optimal sensor spacing in IoT network based on quantum computing technology., and . Int. J. Parallel Emergent Distributed Syst., 38 (1): 58-84 (2023)HybridSN: Exploring 3D-2D CNN Feature Hierarchy for Hyperspectral Image Classification., , , and . CoRR, (2019)Communicative Approximations as Rough Sets., , , and . RSCTC, volume 6086 of Lecture Notes in Computer Science, page 317-326. Springer, (2010)A Novel method for IDC Prediction in Breast Cancer Histopathology images using Deep Residual Neural Networks., and . CoRR, (2019)Simulation and cost analysis of group authentication protocols., , and . IC3, page 1-7. IEEE Computer Society, (2016)Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs., , and . Int. J. Netw. Secur., 18 (1): 1-18 (2016)Effect of Choice of Discretization Methods on Context Extraction from Sensor Data - An Empirical Evaluation., , and . ICDCIT, volume 8337 of Lecture Notes in Computer Science, page 146-151. Springer, (2014)Cost and performance analysis of server-centric authentication protocol in supply chain management., , and . ISSPIT, page 269-274. IEEE Computer Society, (2014)A novel lightweight key management scheme for RFID-sensor integrated hierarchical MANET based on internet of things., , and . Int. J. Adv. Intell. Paradigms, 9 (2/3): 220-245 (2017)