Blockchain Application for IoT Cybersecurity Management
in Essentials of Blockchain Technology, ByKuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino, Boca Raton, Chapman and Hall/CRC doi: 10.1201/9780429674457-7
Kirtana Sunil Phatnani and Hemant A. Patil Role of Music on Infant Developments
Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 198-212. [in press]
Native monkey detection using deep convolution neural network
in Advanced Machine Learning Technologies and Applications. AMLTA 2020, Advances in Intelligent Systems and Computing, vol 1141. Hassanien, A., Bhatnagar, R., Darwish, A. (eds), Springer, Singapore. doi: 10.1007/978-981-15-3383-9_34.
Variational Inequalities in Semi-inner Product Spaces Optimization and Its Applications vol 159
in Computational Mathematics and Variational Analysis, Daras N., Rassias T., (eds), Cham: Springer, pp. 421-439.
Nirmesh J. Shah and Hemant A. Patil Non-audible murmur to audible speech conversion
Voice Technologies for Speech Reconstruction and Enhancement Hemant A. Patil and Amy Neustein, Eds. Boston, MA: De Gruyter, 2020, pp. 125-150.
Optimization of loss functions for predictive soil mapping
in Advanced Machine Learning Technologies and Applications. AMLTA 2020 Advances in Intelligent Systems and Computing, vol 1141., Hassanien, A., Bhatnagar, R., Darwish, A. (eds), Springer, Singapore pp. 95-104 doi: 10.1007/978-981-15-3383-9_9.
Modeling the Dynamics of Carbon Dioxide Over an Educational Institute
in ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 93., Fong S., Dey N., Joshi A. (eds), Springer, Singapore. pp. 65-75 doi: 10.1007/978-981-15-0630-7_7
Preface
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, pp. vii-ix
ODDMS: Online Distributed Dynamic Meeting Scheduler
in ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 93., Fong S., Dey N., Joshi A. (eds), Springer, Singapore pp. 199-208 doi: 10.1007/978-981-15-0630-7_19
Introduction to Authentication and Key Establishment
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 1-52 doi: 10.1007/978-3-662-58146-9_1