30 results on '"Ahmad, Salman"'
Search Results
2. Mutual Authentication Protocol using ECC and Hardware Security Module for IoT Devices.
3. Secure and Intelligent Video Surveillance using Unmanned Aerial Vehicles.
4. Cross-Platform Compatibility and Power Optimization for the SAWBRID System.
5. Secure Automated Video Assistance in Vehicular Networks using Unmanned Aerial Vehicles.
6. Transit System Prediction for Real-time Weather Conditions: Fleet Management and Weather-related Ridership.
7. Enhancing Information Security Courses With a Remotely Accessible Side-Channel Analysis Setup.
8. The Effect of COVID-19 on the Transit System in Two Regions: Japan and USA.
9. SADDLE: Secure Aerial Data Delivery with Lightweight Encryption.
10. A Framework for Transit Monitoring System Using IoT Technology: Two Case Studies.
11. Efficient Hardware/Software Co-Design of Elliptic-Curve Cryptography for the Internet of Things.
12. EPILEPTIC Seizure Classification Using Gradient Tree Boosting Classifier.
13. Object Detection and Classi?cation in Low Resolution Underwater Imagery Using Deep Neural Network and Motion-Inspired Features.
14. Origin-Destination Tracking Analysis of an Intelligent Transit Bus System using Internet of Things.
15. A scalable ECC processor implementation for high-speed and lightweight with side-channel countermeasures.
16. A light-weight hardware/software co-design for pairing-based cryptography with low power and energy consumption.
17. Eliciting Theory for Software Maintenance SLA Management Framework.
18. Panel: Evolving IoT Tech Enables Aging in Place.
19. Inter comparison of classification techniques for vowel speech imagery using EEG sensors.
20. Efficient Hardware Accelerator for IPSec Based on Partial Reconfiguration on Xilinx FPGAs.
21. Extracting Speaker-Specific Information with a Regularized Siamese Deep Network.
22. Identifying and Tackling Diversity of Management and Administration of a Handover Process.
23. Evaluating a Training Process in a Handover Context.
24. Exploring speaker-specific characteristics with deep learning.
25. Core handover problems.
26. Taxonomy of handover activities.
27. Demarcating the Scope of a Predelivery Maintenance Process.
28. Demarcating the Scope of a Handover Process.
29. Evaluating a Taxonomy of Handover Activities in One Swedish Company.
30. Comparing EM3: Predelivery maintenance model with its industrial correspondence.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.