From post

Abnormal human activity recognition system based on R-transform and kernel discriminant technique for elderly home care.

, и . IEEE Trans. Consumer Electron., 57 (4): 1843-1850 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysis Of Camera Movement Errors In Vision-Based Vehicle Tracking., и . IEEE Trans. Pattern Anal. Mach. Intell., 17 (1): 57-61 (1995)Analysis of Camera Movements in Stereo Vision-Based Vehicle Tracking., и . ICIP (2), стр. 710-714. IEEE Computer Society, (1994)Abnormal human activity recognition system based on R-transform and kernel discriminant technique for elderly home care., и . IEEE Trans. Consumer Electron., 57 (4): 1843-1850 (2011)An automatic security test engine for IPv6 network., , , и . Int. J. Wirel. Mob. Comput., 1 (1): 61-69 (2005)A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation., , и . ICISC, том 2288 из Lecture Notes in Computer Science, стр. 146-159. Springer, (2001)Design of Policy-Based Security Management for Intrusion Detection., , и . Security and Management, стр. 337-340. CSREA Press, (2003)Multi-scale Hyper-time Hardware Emulation of Human Motor Nervous System Based on Spiking Neurons using FPGA., , , и . NIPS, стр. 37-45. (2012)Design of a LDAP Schema Based on Network Security Policy Information Model for Storing Security Policy., , и . Security and Management, стр. 373-377. CSREA Press, (2003)Context-based free-form annotation in XML documents, , , , и . Int. J. Hum.-Comput. Stud., 59 (3): 257--285 (сентября 2003)Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications., , , , , и . ACISP, том 2727 из Lecture Notes in Computer Science, стр. 180-191. Springer, (2003)