Author of the publication

Residual networks for text-independent speaker identification: Unleashing the power of residual learning.

, , , , and . J. Inf. Secur. Appl., (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SEIR: A Stackelberg game based approach for energy-aware and incentivized routing in selfish Opportunistic Networks., , and . CISS, page 1-6. IEEE, (2017)A game theory based secure model against Black hole attacks in Opportunistic Networks., , and . CISS, page 1-6. IEEE, (2017)DolNet: A Division Of Labour Based Distributed Object Oriented Software Process Model, and . CoRR, (2012)Business Rules for Business Governance., , and . ICEIS (3), page 360-367. SciTePress, (2014)A Metric for the Activeness of a Distributed Object Oriented Component Library, , , and . CoRR, (2012)Neural network-based routing protocol for opportunistic networks with intelligent water drop optimization., , and . Int. J. Commun. Syst., (2020)Water Problem and Effect of Fluoride in Dausa District. INTERNATIONAL JOURNAL OF TREND IN SCIENTIFIC RESEARCH AND DEVELOPMENT, 6 (5): 1206-1209 (July 2022)Supernode routing: a grid-based message passing scheme for sparse opportunistic networks., , , and . J. Ambient Intell. Humaniz. Comput., 10 (4): 1307-1324 (2019)Early prediction and monitoring of sepsis using sequential long short term memory model., , , and . Expert Syst. J. Knowl. Eng., (2022)Mitigation of black hole attacks in 6LoWPAN RPL-based Wireless sensor network for cyber physical systems., , , , and . Comput. Commun., (2022)