From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Trusted Worrier: A low-cost and high-accuracy user authentication system for firearm exploiting dynamic hand pressure biometrics., , , , , , , и . NSysS, стр. 87-95. IEEE, (2017)Backpacking: Deployment of Heterogeneous Radios in High Data Rate Sensor Networks., , , и . ICCCN, стр. 1-8. IEEE, (2011)A Tale of a Deep Learning Approach to Image Forgery Detection., и . NSysS, стр. 102-110. IEEE, (2018)Securing Highly-Sensitive Information in Smart Mobile Devices through Difficult-to-Mimic and Single-Time Usage Analytics., , , , и . MobiQuitous, стр. 322-331. ACM, (2018)Fault-tolerant design method for tizen applications considering core- and API-level faults., и . NSysS, стр. 116-121. ACM, (2019)Stable Sensor Network (SSN): A Dynamic Clustering Technique for Maximizing Stability in Wireless Sensor Networks., , , и . Wirel. Sens. Netw., 2 (7): 538-554 (2010)An Integrated Digital Platform for Bridging Gaps between General Public, Donors, and Social Welfare Organizations Working for Street Children in Bangladesh., , , , , и . CoRR, (2020)An Intelligent IoT Approach for Analyzing and Managing Crowds., , , , , , , и . IEEE Access, (2021)Leveraging a Smartwatch for Activity Recognition in Salat., , , , и . IEEE Access, (2023)Fault Tolerance Analysis of Car-Following Models for Autonomous Vehicles., , и . IEEE Trans. Intell. Transp. Syst., 23 (11): 20036-20045 (2022)