Author of the publication

Classifying Human Activities with Temporal Extension of Random Forest.

, , and . ICONIP (4), volume 9950 of Lecture Notes in Computer Science, page 3-10. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Face recognition via semi-supervised discriminant local analysis., , , and . ICSIPA, page 292-297. IEEE, (2015)Real time mobile application of in-air signature with Fast Dynamic Time Warping (FastDTW)., , , and . ICSIPA, page 315-320. IEEE, (2015)Biometric Access Control with High Dimensional Facial Features., , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 437-445. Springer, (2016)A Pilot Study of Learning Programming with ScratchJr., , , , , and . FICC (1), volume 651 of Lecture Notes in Networks and Systems, page 785-793. Springer, (2023)Modified TPACK Framework for Teachers' Efficiency, Students' Performance and Students' Engagement., , and . ICICT (1), volume 235 of Lecture Notes in Networks and Systems, page 827-835. Springer, (2021)Anomaly Based Intrusion Detection through Temporal Classification., , and . ICONIP (3), volume 8836 of Lecture Notes in Computer Science, page 612-619. Springer, (2014)Video and voice transmission over LTE networks., , , and . ICCSCE, page 259-263. IEEE, (2013)Application of Bayesian belief networks and fuzzy cognitive maps in intrusion analysis., , , , and . J. Intell. Fuzzy Syst., 35 (1): 111-122 (2018)A Secure Touch-less based Fingerprint Verification System., , , and . Journal of WSCG, 18 (1-3): 1-8 (2010)Classifying Human Activities with Temporal Extension of Random Forest., , and . ICONIP (4), volume 9950 of Lecture Notes in Computer Science, page 3-10. (2016)