Author of the publication

Automatic security system for recognizing unexpected motions through video surveillance.

, , , and . ICCST, page 1-5. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ad Hoc Network Hybrid Management Protocol Based on Genetic Classifiers., , and . Wirel. Eng. Technol., 1 (2): 69-80 (2010)A Blind Video Watermarking Algorithm for Copyright Protection based on Dual Tree Complex Wavelet Transform., , , and . J. Inf. Hiding Multim. Signal Process., 7 (6): 1147-1167 (2016)A dedicated DMA logic addressing a time multiplexed memory to reduce the effects of the system bus bottleneck., , , and . FPL, page 487-490. IEEE, (2008)Implementation of W-CDMA Cell Search on a Highly Parallel and Scalable MPSoC., , , , and . J. Signal Process. Syst., 64 (1): 137-148 (2011)Efficient FFT pruning algorithm for non-contiguous OFDM systems., , and . DASIP, page 144-149. IEEE, (2011)HDDM Hardware Evaluation for Robust Interference Mitigation., , , , and . Sensors, 20 (22): 6492 (2020)Wide-Band Interference Mitigation in GNSS Receivers Using Sub-Band Automatic Gain Control., , , , , and . Sensors, 22 (2): 679 (2022)High-rate DFT-based data manipulator (HDDM) algorithm for effective interference mitigation., , , and . PLANS, page 596-605. IEEE, (2020)Facial Expression Recognition using Transfer Learning., and . ICCST, page 1-5. IEEE, (2018)Emotional analysis of safeness and risk perception of drones during the COVID-19 pandemic in Italy., , , , and . ICCST, page 1-6. IEEE, (2021)