displayNone
Banner

Publications

Books Chapters

  • Geet Patel, Roshani, Sarangi Patel, Tanya Garg, Tapas Kumar Maiti Inverse Kinematics Based Computational Framework for Robot Manipulation Inspired by Human Movements in Proceedings of the Sixth International Conference on Mathematics and Computing, Advances in Intelligent Systems and Computing, vol 1262., Giri, D., Buyya, R., Ponnusamy, S., De, D., Adamatzky, A., Abawajy, J.H. (eds) Springer, Singapore. pp. 201-215. ISBN: 9789811580611. DOI: 10.1007/978-981-15-8061-1_17.
  • Ankur Sharma, Yash Agrawal and Rutu Parekh Design of Prominent Single-Precision 32-Bit Floating-Point Adder Using Single-Electron Transistor Operating at Room Temperature in Advances in VLSI and Embedded Systems. AVES-2019, SVNIT Surat, Lecture Notes in Electrical Engineering, vol 676. , Patel Z., Gupta S., Kumar Y. B. N. (eds), Springer, Singapore. pp. 201-209 ISBN: 9789811562297. doi: 10.1007/978-981-15-6229-7_16
  • Krishna Teja, Parthkumar Patel, Umang Patel, Yash Agrawal and Rutu Parekh Smart Soldier Health Monitoring System Incorporating Embedded Electronics in Advances in VLSI and Embedded Systems. AVES-2019, SVNIT Surat, Lecture Notes in Electrical Engineering, vol 676. , Patel Z., Gupta S., Kumar Y. B. N. (eds), Springer, Singapore. pp. 223–234 ISBN: 9789811562297. doi: 10.1007/978-981-15-6229-7_18
  • Ashwani Kumar, Girish Kumar Mekala, Rajeevan Chandel Performance Analysis of Mixed-Wall CNT Interconnects Using Colliding Bodies Optimization Technique Major Applications of Carbon Nanotube Field-Effect Transistors (CNTFET) Balwinder Raj, Mamta Khosla and Amandeep Singh, Eds. USA: IGI Global, Jan. 2020, pp. 189-211, doi: 10.4018/978-1-7998-1393-4.ch009
  • Colin Boyd Key Agreement Protocols in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 165-240 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_5
  • Colin Boyd Computational Security Models in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 53-94 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_2
  • Anshu Chittora, Hemant A. Patil Infant cry analysis and its classification Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 1- 61.
  • Anshu Chittora and Hemant A. Patil Understanding infant cry analysis for pathology classification in Acoustic Analysis of Pathologies: From Infancy to Young Adulthood, Amy Neustein and Hemant A. Patil, (eds), Boston, MA: De Gruyter pp. 1- 62. doi: 10.1515/9781501513138-001
  • Hardik B. Sailor, Hemant A. Patil Unsupervised Auditory Filterbank Learning for Infant Cry Classification Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 63- 92. [in press]
  • Hardik B. Sailor and Hemant A. Patil Unsupervised auditory filterbank learning for infant cry classification in Acoustic Analysis of Pathologies: From Infancy to Young Adulthood, Amy Neustein and Hemant A. Patil, (eds), Boston, MA: De Gruyter pp. 63- 92. doi: 10.1515/9781501513138-002
Back to Top