Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Public Security Surveillance System Using Blockchain Technology and Advanced Image Processing Techniques., , , , , and . ICIoT, page 104-111. IEEE, (2020)Multimodal Deep Learning Approach for Joint EEG-EMG Data Compression and Classification., , , , and . WCNC, page 1-6. IEEE, (2017)Deep learning and low rank dictionary model for mHealth data classification., , , , and . IWCMC, page 358-363. IEEE, (2018)A Comprehensive Review of Lithium-Ion Batteries Modeling, and State of Health and Remaining Useful Lifetime Prediction., , , and . IEEE Access, (2022)A Deep Learning Approach for Vital Signs Compression and Energy Efficient Delivery in mhealth Systems., , , , , , , and . IEEE Access, (2018)Secrecy for MIMO wiretap and MIMO broadcast channels with fading eavesdroppers: CSI does not increase the secure DoF., , , and . PACRIM, page 479-484. IEEE, (2015)Deep learning approach for EEG compression in mHealth system., , and . IWCMC, page 1508-1512. IEEE, (2017)Optimal Consensus Time Synchronizations for Wireless Sensor Networks., , , , , and . IWCMC, page 1145-1152. IEEE, (2020)Towards Information Theoretic Interpretation of Practical Ciphers., , , , , and . IWCMC, page 807-812. IEEE, (2021)Performance evaluation of experimental damage detection in structure health monitoring using acceleration., , , , , and . IWCMC, page 529-534. IEEE, (2016)