Author of the publication

Suspicious Activity Recognition Using Proposed Deep L4-Branched-Actionnet With Entropy Coded Ant Colony System Optimization.

, , , , , and . IEEE Access, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CDR based glaucoma detection using fundus images: a review., , , and . IJAPR, 4 (3): 261-306 (2017)A novel method for content-based image retrieval to improve the effectiveness of the bag-of-words model using a support vector machine., , , , , and . J. Inf. Sci., (2019)A Novel Fused Image Compression Technique Using DFT, DWT, and DCT., , , , and . J. Inf. Hiding Multim. Signal Process., 8 (2): 261-271 (2017)Classification of human's activities from gesture recognition in live videos using deep learning., , , , and . Concurr. Comput. Pract. Exp., (2022)An automated system for cucumber leaf diseased spot detection and classification using improved saliency method and deep features selection., , , , , and . Multim. Tools Appl., 79 (25-26): 18627-18656 (2020)Brain Tumor Detection and Multi-Grade Segmentation Through Hybrid Caps-VGGNet Model., , , , , and . IEEE Access, (2023)Transfer Learning-Based Smart Features Engineering for Osteoarthritis Diagnosis From Knee X-Ray Images., , , , and . IEEE Access, (2023)Design of Nonlinear Component of Block Cipher Using Gravesian Octonion Integers., , , , , and . IEEE Access, (2023)Recent Developments in Detection of Central Serous Retinopathy Through Imaging and Artificial Intelligence Techniques-A Review., , , , , and . IEEE Access, (2021)An Optimized Role-Based Access Control Using Trust Mechanism in E-Health Cloud Environment., , , , , , and . IEEE Access, (2023)