Author of the publication

Exploring 2D Representation and Transfer Learning Techniques for People Identification in Indoor Localization.

, , , , , , , , and . ICSPIS, page 173-177. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formalizing the movement of microparticles in a continuous flow microfluidic device for field flow fractionation., , , , and . HealthCom, page 114-119. IEEE, (2015)Introduction to the Special Issue on Reliability and Security of e-Health Information Systems., and . Scalable Comput. Pract. Exp., 17 (3): iii-iv (2016)A Distributed Algorithm with Optimum Communication for Cyber Physical Systems: Multi-tank Process Case Study., , and . SysCon, page 1-7. IEEE, (2019)Traffic Shaping and Delay Optimization in Demand Side Management., , and . UKSim, page 722-727. IEEE, (2013)Lightweight security protocol for health monitoring in Ambient Assisted Living environment., , and . ICC Workshops, page 1282-1287. IEEE, (2017)An axiomatic model for formal specification requirements of ubiquitous healthcare systems.. CCNC, page 898-902. IEEE, (2013)The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions., , , , , , and . IEEE Access, (2023)Enhanced Not Recently Used Algorithm for Cache Memory Systems in Mobile Computing., , , , , , and . ACR, volume 700 of Lecture Notes in Networks and Systems, page 433-442. Springer, (2023)Formal Verification of Control Strategies for a Cyber Physical System., , and . ICDCS Workshops, page 91-96. IEEE Computer Society, (2017)A Framework for Integrating Big Data Security Into Agricultural Supply Chain., , , , , , and . BigDataService, page 191-194. IEEE, (2019)