displayNone
Banner

Publications

Books Chapters

  • Krishna Teja, Parthkumar Patel, Umang Patel, Yash Agrawal and Rutu Parekh Smart Soldier Health Monitoring System Incorporating Embedded Electronics in Advances in VLSI and Embedded Systems. AVES-2019, SVNIT Surat, Lecture Notes in Electrical Engineering, vol 676. , Patel Z., Gupta S., Kumar Y. B. N. (eds), Springer, Singapore. pp. 223–234 ISBN: 9789811562297. doi: 10.1007/978-981-15-6229-7_18
  • Ajita Misra, Vinay Palaparthy, Yash Agrawal Variability Analysis of On-Chip Interconnect System Using Prospective Neural Network in Advances in VLSI and Embedded Systems, Lecture Notes in Electrical Engineering, vol 676., Patel Z., Gupta S., Kumar Y. B. N. (eds), Springer, Singapore pp. 259-271 ISBN: 9789811562297. doi: 10.1007/978-981-15-6229-7_21
  • Sujata and Suman K. Mitra Modular facial expression recognition using double channel DNNs
  • Colin Boyd Introduction to Authentication and Key Establishment in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 1-52 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_1
  • Anshu Chittora, Hemant A. Patil Infant cry analysis and its classification Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 1- 61.
  • Sanjay Srivastava ODDMS: Online Distributed Dynamic Meeting Scheduler in ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 93., Fong S., Dey N., Joshi A. (eds), Springer, Singapore pp. 199-208 ISBN: 9789811506307 doi: 10.1007/978-981-15-0630-7_19
  • Colin Boyd Protocols Using Shared Key Cryptography in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 95-134 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_3
  • Hardik B. Sailor, Hemant A. Patil Unsupervised Auditory Filterbank Learning for Infant Cry Classification Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 63- 92. [in press]
  • Colin Boyd Authentication and Key Transport Using Public Key Cryptography in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 135-164 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_4
  • Hemant A. Patil, Kirtana Sunil Phatnani Role of Music on Infant Developments Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 198-212. [in press]
Back to Top