displayNone
banner

Publications

Books Chapters

  • Optimization of loss functions for predictive soil mapping in Advanced Machine Learning Technologies and Applications. AMLTA 2020 Advances in Intelligent Systems and Computing, vol 1141., Hassanien, A., Bhatnagar, R., Darwish, A. (eds), Springer, Singapore pp. 95-104 doi: 10.1007/978-981-15-3383-9_9.
  • Nirmesh J. Shah and Hemant A. Patil Non-audible murmur to audible speech conversion Voice Technologies for Speech Reconstruction and Enhancement Hemant A. Patil and Amy Neustein, Eds. Boston, MA: De Gruyter, 2020, pp. 125-150.
  • Variational Inequalities in Semi-inner Product Spaces Optimization and Its Applications vol 159 in Computational Mathematics and Variational Analysis, Daras N., Rassias T., (eds), Cham: Springer, pp. 421-439.
  • Girish Kumar Mekala, Yash Agrawal, Rajeevan Chandel and Ashwani Kumar Performance Analysis of Mixed-Wall CNT Interconnects Using Colliding Bodies Optimization Technique Major Applications of Carbon Nanotube Field-Effect Transistors (CNTFET) Balwinder Raj, Mamta Khosla and Amandeep Singh, Eds. USA: IGI Global, Jan. 2020, pp. 189-211, doi: 10.4018/978-1-7998-1393-4.ch009
  • Modeling the Dynamics of Carbon Dioxide Over an Educational Institute in ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 93., Fong S., Dey N., Joshi A. (eds), Springer, Singapore. pp. 65-75 doi: 10.1007/978-981-15-0630-7_7
  • Preface in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, pp. vii-ix
  • Introduction to Authentication and Key Establishment in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 1-52 doi: 10.1007/978-3-662-58146-9_1
  • ODDMS: Online Distributed Dynamic Meeting Scheduler in ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 93., Fong S., Dey N., Joshi A. (eds), Springer, Singapore pp. 199-208 doi: 10.1007/978-981-15-0630-7_19
  • Protocols Using Shared Key Cryptography in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 95-134 doi: 10.1007/978-3-662-58146-9_3
  • Authentication and Key Transport Using Public Key Cryptography in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 135-164 doi: 10.1007/978-3-662-58146-9_4
Back to Top