From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Anomaly Based Approach for Intrusion Detection by Authorized Users in Database Systems., , и . ICISTM, том 54 из Communications in Computer and Information Science, стр. 348-356. Springer, (2010)Design Aspects of Body-Worn UWB Antenna for Body-Centric Communication: A Review., и . Wirel. Pers. Commun., 97 (4): 5865-5895 (2017)Area Coverage Optimization in Three-Dimensional Wireless Sensor Network., и . Wirel. Pers. Commun., 117 (2): 843-865 (2021)An Efficient Source Selection Approach for Retrieving Electronic Health Records From Federated Clinical Repositories., и . Int. J. Inf. Technol. Syst. Approach, 15 (2): 1-18 (2022)CNN based framework for detection of epileptic seizures., и . Multim. Tools Appl., 81 (12): 17057-17070 (2022)Epileptical Seizure Detection: Performance analysis of gamma band in EEG signal Using Short-Time Fourier Transform., , , и . WPMC, стр. 1-6. IEEE, (2019)In-memory Implementation of On-chip Trainable and Scalable ANN for AI/ML Applications., , , и . CoRR, (2020)Deployment techniques in wireless sensor networks: a survey, classification, challenges, and future research issues., , и . J. Supercomput., 76 (9): 7333-7373 (2020)Secure Transmission of EEG Data Using Watermarking Algorithm for the Detection of Epileptical Seizures., , и . Traitement du Signal, 38 (2): 473-479 (2021)Cross domain sentiment analysis using transfer learning., , , , , , и . ICIIS, стр. 1-5. IEEE, (2017)