Author of the publication

Accelerating Existing Non-Blind Image Deblurring Techniques through a Strap-On Limited-Memory Switched Broyden Method.

, , , , , and . IEICE Trans. Inf. Syst., 101-D (5): 1288-1295 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved algorithm for mobile large scale sensor networks based on LEACH protocol., , , and . SoftCOM, page 139-143. IEEE, (2014)CROW2: Internet of humans-based platform for disaster relief and emergency communication., , , , and . CCNC, page 578-579. IEEE, (2017)Enhanced IoT-Based End-To-End Emergency and Disaster Relief System., , , , and . J. Sens. Actuator Networks, 6 (3): 19 (2017)Modulation Recognition for MIMO Relaying Broadcast Channels with Direct Link., , , and . IEEE Wirel. Commun. Lett., 3 (1): 50-53 (2014)ORACE-Net: A novel multi-hop body-to-body routing protocol for public safety networks., , , and . Peer-to-Peer Netw. Appl., 10 (3): 726-749 (2017)ELPA: A new key agreement scheme based on linear prediction of ECG features for WBAN., , , and . EUSIPCO, page 81-85. IEEE, (2015)On-the-Fly Architecture Design and Implementation of a Real-Time Stereovision System., , and . ACIVS, volume 10016 of Lecture Notes in Computer Science, page 711-722. (2016)Nanophotonic network on chip for next generation of multiprocessors system on chip., , , , and . CSNDSP, page 443-448. IEEE, (2014)A GDPR Controller for IoT Systems: Application to e-Health., , , and . WETICE, page 170-173. IEEE, (2019)Hierarchical anomaly based intrusion detection and localization in IoT., , and . IWCMC, page 108-113. IEEE, (2019)