Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Analysis of Trust, Employee Trustworthiness, Fraud, and Internal Controls., , , and . IJSDS, 4 (3): 66-89 (2013)Advanced networking services for distributed multimedia streaming applications., , , and . Multimedia Tools Appl., 34 (2): 179-200 (2007)Novel base station radio technologies for third-generation wireless applications., , , , , and . Bell Labs Technical Journal, 7 (3): 151-167 (2003)Classification of Human Gestures Using Temporal Templates and Artificial Neural Networks., , , and . Austr. J. Intelligent Information Processing Systems, 8 (1): 43-49 (2002)Power Consumption Optimization Strategy for Wireless Networks., , and . Wireless Personal Communications, 59 (3): 487-498 (2011)Performance Analysis of 4 × 4 and 8 × 8 MIMO System, to Achieve Higher Spectral Efficiency in Rayleigh and Rician Fading Distributions., , and . Wireless Personal Communications, 79 (1): 687-701 (2014)Decision points for adoption cloud computing in small, medium enterprises (SMEs)., , , and . ICITST, page 688-691. IEEE, (2012)Intel® IXP28XX network processor based NG edge router., and . COMSWARE, page 1-12. IEEE, (2006)Service innovation for the user interface of an ATM catering to the needs of the student community., , , , and . IEEM, page 1180-1184. IEEE, (2011)Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN., and . IJCNDS, 17 (2): 189-201 (2016)