Author of the publication

Target Recognition in Infrared Imagery Using Convolutional Neural Network.

, , , , and . CVIP (2), volume 460 of Advances in Intelligent Systems and Computing, page 25-34. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Some Coding Theorems Based on Three Types of the Exponential Form of Cost Functions., and . Open Syst. Inform. Dynam., (2012)Software Tool for Seismic Data Recorder and Analyser, , , and . IETE Journal of Education, 41 (1-2): 23--30 (January 2000)Fuzzy-frequency ratio model for avalanche susceptibility mapping., , , , and . Int. J. Digit. Earth, 9 (12): 1168-1184 (2016)StressNet: Detecting Stress in Thermal Videos., , , , , , , , , and . CoRR, (2020)(R, S)-Norm Information Measure and A Relation Between Coding and Questionnaire Theory., and . Open Syst. Inf. Dyn., 23 (3): 1650015:1-1650015:12 (2016)A resource allocation framework for adaptive video streaming over LTE., , and . J. Netw. Comput. Appl., (2017)Multigated Carbon Nanotube Field Effect Transistors-Based Physically Unclonable Functions As Security Keys., , , , , and . IEEE Internet of Things Journal, 6 (1): 325-334 (2019)Research Trends in Network-Based Intrusion Detection Systems: A Review., , and . IEEE Access, (2021)Forty years of the International Journal of Information Management: A bibliometric analysis., , , and . Int. J. Inf. Manag., (2021)Edge Computing-Based Layered Video Streaming Over Integrated Satellite and Terrestrial 5G Networks., , , and . IEEE Access, (2022)