Author of the publication

A Deep Learning Approach for Fatigue Prediction in Sports Using GPS Data and Rate of Perceived Exertion.

, , , , , and . IEEE Access, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey on security challenges and protocols of electric vehicle dynamic charging system., , , , and . Secur. Priv., (2022)Easy-Auth: Graphical Password Authentication using a Randomization Method., , , , , and . LATINCOM, page 1-6. IEEE, (2021)Design of a Low-Power BLE5-Based Wearable Device for Tracking Movements of Football Players., , , , , , and . ISOCC, page 11-12. IEEE, (2019)An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system., , and . Peer-to-Peer Netw. Appl., 8 (6): 1059-1069 (2015)Privacy preserving authenticated key agreement based on bilinear pairing for uHealthcare., and . Int. Arab J. Inf. Technol., 18 (4): 523-530 (2021)Integrated In-vehicle Monitoring System Using 3D Human Pose Estimation and Seat Belt Segmentation., , , , , and . CoRR, (2022)Certificate-less authenticated key agreement scheme with anonymity for smart grid communications., , , and . J. Intell. Fuzzy Syst., 43 (2): 1859-1869 (2022)A Pairing-Free Public Key Encryption with Keyword Searching for Cloud Storage Services., and . AFRICOMM, volume 135 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 70-78. Springer, (2013)Three Factor Authentication Protocol Based on Bilinear Pairing., and . MUE, volume 240 of Lecture Notes in Electrical Engineering, page 253-259. Springer, (2013)PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD, and . International Journal on Cryptography and Information Security (IJCIS), 8 (3): 15-25 (September 2018)