Author of the publication

Image-Based Text Classification using 2D Convolutional Neural Networks.

, , , , , , , , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 144-149. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The need for a digital rights management framework for the next generation of e-government services., , , , , , , , and . Electron. Gov. an Int. J., 1 (1): 8-28 (2004)Introduction to the special issue on emerging multimodal interfaces., , and . Pers. Ubiquitous Comput., 13 (1): 1-2 (2009)Comparison of detailed occupancy profile generative methods to published standard diversity profiles., , , , , , , and . Pers. Ubiquitous Comput., 21 (3): 521-535 (2017)A fuzzy expert system for the early warning of accidents due to driver hypo-vigilance., , and . Pers. Ubiquitous Comput., 13 (1): 43-49 (2009)IoT-based prediction models in the environmental context: A systematic Literature Review., , , , and . Internet Things, (2022)Recognizing suspicious activities in infrared imagery using appearance-based features and the theory of hidden conditional random fields for outdoor perimeter surveillance., , , , and . J. Electronic Imaging, 24 (6): 061111 (2015)Accessibility through Preferences: Context-Aware Recommender of Settings., , , , , , , , and . HCI (4), volume 8513 of Lecture Notes in Computer Science, page 224-235. Springer, (2014)Substance deposition assessment in obstructed pulmonary system through numerical characterization of airflow and inhaled particles attributes., , , , , , , , , and 1 other author(s). BMC Medical Informatics Decis. Mak., 17 (S-3): 25-44 (2017)3D object retrieval using the 3D shape impact descriptor., , , and . Pattern Recognit., 42 (11): 2447-2459 (2009)Acceleration at the Edge for Supporting SMEs Security: The FORTIKA Paradigm., , , , , , , , , and 5 other author(s). IEEE Commun. Mag., 57 (2): 41-47 (2019)