displayNone
Banner

Publications

Books Chapters

  • Alexander Tolstoy, Manik Lal Das, Natalia Miloslavskaya, Vladimir Budzko Blockchain Application for IoT Cybersecurity Management in Essentials of Blockchain Technology, ByKuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino, Boca Raton, Chapman and Hall/CRC ISBN: 9780429674457. doi: 10.1201/9780429674457-7
  • Harsh Kotta, Karan Pardasani, Megha Pandya and Ranendu Ghosh Optimization of loss functions for predictive soil mapping in Advanced Machine Learning Technologies and Applications. AMLTA 2020 Advances in Intelligent Systems and Computing, vol 1141., Hassanien, A., Bhatnagar, R., Darwish, A. (eds), Springer, Singapore pp. 95-104 ISBN: 9789811533839. doi: 10.1007/978-981-15-3383-9_9.
  • Nabin K. Sahu, Ouayl Chadli and R. N. Mohapatra Variational Inequalities in Semi-inner Product Spaces Optimization and Its Applications vol 159 in Computational Mathematics and Variational Analysis, Daras N., Rassias T., (eds), Cham: Springer, pp. 421-439.
  • Arnav Saha, Srikumar Sastry Modeling the Dynamics of Carbon Dioxide Over an Educational Institute in ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 93., Fong S., Dey N., Joshi A. (eds), Springer, Singapore. pp. 65-75 ISBN: 9789811506307 doi: 10.1007/978-981-15-0630-7_7
  • Anshu Chittora, Hemant A. Patil Infant cry analysis and its classification Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 1- 61.
  • Colin Boyd Preface in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, pp. vii-ix ISBN: 9783662581452
  • Hardik B. Sailor, Hemant A. Patil Unsupervised Auditory Filterbank Learning for Infant Cry Classification Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 63- 92. [in press]
  • Colin Boyd Introduction to Authentication and Key Establishment in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 1-52 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_1
  • Sanjay Srivastava ODDMS: Online Distributed Dynamic Meeting Scheduler in ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 93., Fong S., Dey N., Joshi A. (eds), Springer, Singapore pp. 199-208 ISBN: 9789811506307 doi: 10.1007/978-981-15-0630-7_19
  • Hemant A. Patil, Kirtana Sunil Phatnani Role of Music on Infant Developments Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 198-212. [in press]
Back to Top