displayNone
banner

Publications

Books Chapters

  • Optimization of loss functions for predictive soil mapping in Advanced Machine Learning Technologies and Applications. AMLTA 2020 Advances in Intelligent Systems and Computing, vol 1141., Hassanien, A., Bhatnagar, R., Darwish, A. (eds), Springer, Singapore pp. 95-104 doi: 10.1007/978-981-15-3383-9_9.
  • Modeling the Dynamics of Carbon Dioxide Over an Educational Institute in ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 93., Fong S., Dey N., Joshi A. (eds), Springer, Singapore. pp. 65-75 doi: 10.1007/978-981-15-0630-7_7
  • Anshu Chittora and Hemant A. Patil Infant cry analysis and its classification Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 1- 61.
  • Hardik B. Sailor and Hemant A. Patil Unsupervised Auditory Filterbank Learning for Infant Cry Classification Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 63- 92. [in press]
  • Preface in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, pp. vii-ix
  • ODDMS: Online Distributed Dynamic Meeting Scheduler in ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 93., Fong S., Dey N., Joshi A. (eds), Springer, Singapore pp. 199-208 doi: 10.1007/978-981-15-0630-7_19
  • Kirtana Sunil Phatnani and Hemant A. Patil Role of Music on Infant Developments Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 198-212. [in press]
  • Introduction to Authentication and Key Establishment in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 1-52 doi: 10.1007/978-3-662-58146-9_1
  • Nirmesh J. Shah and Hemant A. Patil Non-audible murmur to audible speech conversion Voice Technologies for Speech Reconstruction and Enhancement Hemant A. Patil and Amy Neustein, Eds. Boston, MA: De Gruyter, 2020, pp. 125-150.
  • Protocols Using Shared Key Cryptography in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 95-134 doi: 10.1007/978-3-662-58146-9_3
Back to Top