Author of the publication

Poses Classification in a Taekwondo Lesson Using Skeleton Data Extracted from Videos with Shallow and Deep Learning Architectures.

, , , , , , and . FDSE (CCIS Volume), volume 1688 of Communications in Computer and Information Science, page 447-461. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generic feature selection measure for botnet malware detection., , and . ISDA, page 711-717. IEEE, (2012)Fake face detection in video using shallow deep learning architectures., , , and . Int. J. Intell. Syst. Technol. Appl., 20 (6): 469-486 (2022)Diagnosis Approaches for Colorectal Cancer Using Manifold Learning and Deep Learning., and . SN Comput. Sci., 1 (5): 281 (2020)Fault Diagnosis of DC-Link Capacitors in Three-Phase AC/DC PWM Converters by Online Estimation of Equivalent Series Resistance., , , , and . IEEE Trans. Ind. Electron., 60 (9): 4118-4127 (2013)New Ideas in Ranking for Personalized Fashion Recommender Systems., , , , , and . Business and Consumer Analytics: New Ideas, Springer, (2019)BPRH: Bayesian personalized ranking for heterogeneous implicit feedback., , , , , and . Inf. Sci., (2018)A GLCM Algorithm for Optimal Features of Mammographic Images for Detection of Breast Cancer., , and . ICSSE, page 295-299. IEEE, (2021)A Time-Series Process Event Log Preprocessing Approach for Data-Intensive and Predictive Operationalization of Smart Factories., , , , , , , and . ICACT, page 252-255. IEEE, (2022)A big data analytics approach to combat telecommunication vulnerabilities., , , and . Clust. Comput., 20 (3): 2363-2374 (2017)Specifying and Reasoning about CPS through the Lens of the NIST CPS Framework., , , , , and . CoRR, (2022)