Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Short: Blind Separation of the Multiarray Multisensor Systems Using the CP Decomposition., , , and . NETYS, volume 8593 of Lecture Notes in Computer Science, page 313-318. Springer, (2014)Systematic Crowd Mobility Management to Avoid Catastrophic Disasters of Human Stampedes: The Case of Mina Hajj., , , , and . PECCS, page 66-73. SCITEPRESS, (2020)Fingerprint Template Protection Using Irreversible Minutiae Tetrahedrons., , , and . Comput. J., 65 (10): 2741-2754 (2022)Golay pairs waveform for automotive radar target parameters estimation., and . Signal Image Video Process., 15 (6): 1231-1238 (2021)On the methodology of fingerprint template protection schemes conception : meditations on the reliability., , , and . EURASIP J. Inf. Secur., 2022 (1): 3 (2022)Analysis of the radar ambiguity function for a new Golay sets shaping., and . ISIVC, page 1-4. IEEE, (2021)Study of security problem in cloud computing with access control based on the blockchain., , , and . ISIVC, page 1-6. IEEE, (2022)Performance index for tensor polyadic decompositions., , , and . EUSIPCO, page 1-5. IEEE, (2013)A progression strategy of proximal algorithm applied to the digital images inpainting., , and . ISIVC, page 282-285. IEEE, (2018)A robust minutia-based approach for securing fingerprint templates., , and . ISIVC, page 286-290. IEEE, (2018)